CVE-2024-23824

mailcow is a dockerized email package, with multiple containers linked in one bridged network. The application is vulnerable to pixel flood attack, once the payload has been successfully uploaded in the logo the application goes slow and doesn't respond in the admin page. It is tested on the versions 2023-12a and prior and patched in version 2024-01.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mailcow:mailcow\:_dockerized:*:*:*:*:*:*:*:*

History

10 Feb 2024, 04:04

Type Values Removed Values Added
References () https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack - () https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack - Exploit, Third Party Advisory
References () https://github.com/mailcow/mailcow-dockerized/commit/7f6f7e0e9ff608618e5b144bcf18d279610aa3ed - () https://github.com/mailcow/mailcow-dockerized/commit/7f6f7e0e9ff608618e5b144bcf18d279610aa3ed - Patch
References () https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-45rv-3c5p-w4h7 - () https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-45rv-3c5p-w4h7 - Vendor Advisory
Summary
  • (es) mailcow es un paquete de correo electrónico acoplado, con múltiples contenedores vinculados en una red puente. La aplicación es vulnerable al ataque de inundación de píxeles; una vez que el payload se ha cargado correctamente en el logotipo, la aplicación se vuelve lenta y no responde en la página de administración. Se prueba en las versiones 2023-12a y anteriores y se parchea en la versión 2024-01.
CPE cpe:2.3:a:mailcow:mailcow\:_dockerized:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : 4.7
v2 : unknown
v3 : 2.7
First Time Mailcow
Mailcow mailcow\

02 Feb 2024, 16:30

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-02 16:15

Updated : 2024-02-10 04:04


NVD link : CVE-2024-23824

Mitre link : CVE-2024-23824

CVE.ORG link : CVE-2024-23824


JSON object : View

Products Affected

mailcow

  • mailcow\
CWE
NVD-CWE-noinfo CWE-400

Uncontrolled Resource Consumption