Incubating the new Sympa documentation site

2020-002 Security flaws in setuid wrappers

The Sympa Community 2020-05-27 (Update)


A fix is available for a vulnerability discovered in Sympa web interface.

Systems Affected

Problem Description

A vulnerability has been discovered in Sympa web interface by which attacker can execute arbitrary code with root privileges.

Sympa uses two sorts of setuid wrappers:

The FastCGI wrappers (wwsympa-wrapper.fcgi and sympa_soap_server-wrapper.fcgi) were used to make the web interface running under privileges of a dedicated user.

The newaliases wrapper (sympa_newaliases-wrapper) allows Sympa to update the alias database with root privileges.

Since these setuid wrappers did not clear environment variables, if environment variables like PERL5LIB were injected, forged code might be loaded and executed under privileges of setuid-ed users.

For more details see References.


Attacker can execute arbitrary code with root privileges.



or, if you have installed Sympa using earlier version of source distribution,

CVE Numbers




The security flaw this advisory describes was reported by Nicolas Chatelain, Sysdream Labs.

Change log

CC BY-SA 4.0 Unless otherwise specified, the contents of this document are licensed under the Creative Commons - Attribution - ShareAlike license. For more details see LICENSE and AUTHORS.

Theme originally designed by orderedlist