CVE-2024-30270

mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability is a combination of path traversal and arbitrary code execution, specifically targeting the `rspamd_maps()` function. It allows authenticated admin users to overwrite any file writable by the www-data user by exploiting improper path validation. The exploit chain can lead to the execution of arbitrary commands on the server. Version 2024-04 contains a patch for the issue.
Configurations

No configuration.

History

12 Dec 2024, 21:15

Type Values Removed Values Added
References
  • () https://www.sonarsource.com/blog/remote-code-execution-in-mailcow-always-sanitize-error-messages -

Information

Published : 2024-04-04 21:15

Updated : 2024-12-12 21:15


NVD link : CVE-2024-30270

Mitre link : CVE-2024-30270

CVE.ORG link : CVE-2024-30270


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')