Vulnerabilities
Vulnerable Software
Mailcow:  >> Mailcow  >> _dockerized  Security Vulnerabilities
mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an extended privilege vulnerability can be exploited by manipulating the custom parameters regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, or maxlinelengthcmd to execute arbitrary code. Users should update their mailcow instances with the `update.sh` script in the mailcow root directory to 2022-06a or newer to receive a patch for this issue. As a temporary workaround, the Syncjob ACL can be removed from all mailbox users, preventing changes to those settings.
CVSS Score
8.8
EPSS Score
0.058
Published
2022-07-11
mailcow before 2022-05d allows a remote authenticated user to inject OS commands and escalate privileges to domain admin via the --debug option in conjunction with the ---PIPEMESS option in Sync Jobs.
CVSS Score
8.8
EPSS Score
0.227
Published
2022-05-20
mailcow 0.14, as used in "mailcow: dockerized" and other products, has CSRF.
CVSS Score
8.8
EPSS Score
0.003
Published
2017-05-14


Contact Us

Shodan ® - All rights reserved