independently by two researchers . “ If the target server uses Sendmail and SquirrelMail is configured to use it as a command-line program , it ’ s possible to trick sendmail into using an attacker-provided configuration file that triggers the execution of an arbitrary command , ” the explanation provided by MITRE reads . “ For exploitation , the attacker must upload a sendmail.cf file as an email attachment , and inject the sendmail.cf filename with the -C option within the ‘ Options > Personal Informations > Email Address ’ setting. ” The bug was foundVulnerability-related.DiscoverVulnerabilityby researchers Filippo Cavallarin and Dawid Golunski , independently of one another , and affects SquirrelMail versions 1.4.22 and below . Golunski reportedVulnerability-related.DiscoverVulnerabilityit to SquirrelMail ( sole ) developer Paul Lesniewski , who asked for a delay of publication of the details until he could fixVulnerability-related.PatchVulnerabilitythe flaw . But as Cavallarin publishedVulnerability-related.DiscoverVulnerabilitydetails about it last week ( after not receiving any reply by the SquirrelMail developer ) , Golunski did the same during the weekend . Both researchers providedVulnerability-related.DiscoverVulnerabilitya proof-of-concept exploit for the flaw , and Cavallarin even offeredVulnerability-related.PatchVulnerabilityan unofficial patch for pluggingVulnerability-related.PatchVulnerabilitythe hole . All this prompted Lesniewski to push outVulnerability-related.PatchVulnerabilitya patch on Monday , and new , patched version snapshots of the software ( 1.4.23-svn and 1.5.2-svn ) . He also told The Register that exploitation of the bug is difficult to pull off . “ In order to exploit the bug , a malicious user would need to have already gained control over a mail account by other means , SquirrelMail would need to be configured to allow users to change their outgoing email address ( we recommend keeping this disabled ) , the user would need to determine the location of the attachments directory ( by gaining shell access or making guesses ) , the permissions on said directory and files would need to allow access by other processes ( by default this will usually be the case , but prudent admins will exert more stringent access controls ) and of course , SquirrelMail needs to be configured to send via Sendmail and not SMTP ( default is SMTP ) , ” he explained . Still , according to Golunski , the 1.4.23 version snapshot offeredVulnerability-related.PatchVulnerabilityon Monday was still vulnerableVulnerability-related.DiscoverVulnerability. But another one was pushed outVulnerability-related.PatchVulnerabilitytoday , so it ’ s possible that the issue was finally , definitely fixedVulnerability-related.PatchVulnerability. Users can wait to update their installation until things become more clear , and in the meantime , they can protect themselves by configuring their systems not to use Sendmail .