[clamav-users] DNS request if an external server is specified in the file name

G.W. Haywood clamav at jubileegroup.co.uk
Thu Mar 10 10:28:00 UTC 2022


Hi there,

On Thu, 10 Mar 2022, di82wal wrote:

> we had a penetration test of our application (moodle) a few weeks ago and in 
> the background we use CLAM-AV as antivirus.
>
> During this test the following behavior was observed with Clam-AV:
> If an external server is specified as part of the filename when uploading a 
> file that is objected to by the virus scanner, a corresponding DNS request is 
> sent to it (e. g. S1_hostname.txt). The same happens if instead of the bare 
> server name a payload is specified that tries to execute a command that 
> performs this lookup (e. g. S1_nslookup.txt).
> The latter behavior, suggests that command injection is also possible here. 
> However, in LSI's internal quality assurance it was not possible to prove the 
> execution of other commands (e.g. whoami), since their result was not 
> included in the server response.
>
> I would exclude command injection since CVE-2020-76613 
> (https://www.opencve.io/cve/CVE-2020-7613).
>
> But I'm not getting anywhere with the DNS lookup issue. Is there a 
> configuration setting I'm overlooking? Or is there a way to disable this 
> behavior?

Your report is very light on detail.

Please provide

1) The exact version(s) of ClamAV which you are using.
2) Build and installation details.
3) The output of 'clamconf -n'.
4) The exact version(s) of the operating system(s) which you are using.
5) *Precise* instructions to enable replication of the issues.

Using versions 0.104.x and either 'clamscan' or 'clamdscan', and a
test file which contains the name of a local machine, and running
'tcpdump' on that machine to look for DNS packets from the ClamAV
server, I have not yet managed to confirm the alleged DNS behaviour.

-- 

73,
Ged.


More information about the clamav-users mailing list