Article Details
Scrape Timestamp (UTC): 2024-06-19 07:39:22.601
Source: https://thehackernews.com/2024/06/mailcow-mail-server-flaws-expose.html
Original Article Text
Click to Toggle View
Mailcow Mail Server Flaws Expose Servers to Remote Code Execution. Two security vulnerabilities have been disclosed in the Mailcow open-source mail server suite that could be exploited by malicious actors to achieve arbitrary code execution on susceptible instances. Both shortcomings impact all versions of the software prior to version 2024-04, which was released on April 4, 2024. The issues were responsibly disclosed by SonarSource on March 22, 2024. The flaws, rated Moderate in severity, are listed below - The second of the two flaws is rooted in the fact that it saves details of the exception sans any sanitization or encoding, which are then rendered into HTML and executed as JavaScript within the users' browser. As a result, an attacker could take advantage of the scenario to inject malicious scripts into the admin panel by triggering exceptions with specially crafted input, effectively allowing them to hijack the session and perform privileged actions in the context of an administrator. Put differently, by combining the two flaws, it's possible for a malicious party to take control of accounts on a Mailcow server and gain access to sensitive data as well as execute commands. In a theoretical attack scenario, a threat actor can craft an HTML email containing a CSS background image which is loaded from a remote URL, using it to trigger the execution of an XSS payload. "An attacker can combine both vulnerabilities to execute arbitrary code on the admin panel server of a vulnerable mailcow instance," SonarSource vulnerability researcher Paul Gerste said. "The requirement for this is that an admin user views a malicious email while being logged into the admin panel. The victim does not have to click a link inside the email or perform any other interaction with the email itself, they only have to continue using the admin panel after viewing the email." Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.
Daily Brief Summary
Two vulnerabilities in the Mailcow mail server suite can lead to arbitrary code execution on affected servers.
All versions of Mailcow prior to the April 2024 release (version 2024-04) are susceptible to these security flaws.
The vulnerabilities allow attackers to inject malicious scripts into the admin panel, potentially hijacking administrator sessions.
Attack scenarios include sending a specially crafted HTML email to trigger unauthorized actions without user interaction.
Both the vulnerabilities were responsibly disclosed by SonarSource on March 22, 2024, with the software flaws being rated as moderate in severity.
Exploitations of these flaws could allow attackers to execute commands and access sensitive data under the guise of an administrator.
Mailcow has released an updated version to address these vulnerabilities and users are advised to update immediately to protect their data.