Loading
Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
Use CWE-269, Exim vendor hub and Exim product page to widen CVE-2020-28008 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2023-42117, CVE-2023-42116 and CVE-2023-42115 for nearby disclosures in the same product family.