CVE-2022-39258

mailcow is a mailserver suite. A vulnerability innversions prior to 2022-09 allows an attacker to craft a custom Swagger API template to spoof Authorize links. This could redirect a victim to an attacker controller place to steal Swagger authorization credentials or create a phishing page to steal other information. The issue has been fixed with the 2022-09 mailcow Mootember Update. As a workaround, one may delete the Swapper API Documentation from their e-mail server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mailcow:mailcow\:_dockerized:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:17

Type Values Removed Values Added
References () https://github.com/mailcow/mailcow-dockerized/pull/4766 - Patch, Third Party Advisory () https://github.com/mailcow/mailcow-dockerized/pull/4766 - Patch, Third Party Advisory
References () https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-vjgf-cp5p-wm45 - Exploit, Third Party Advisory () https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-vjgf-cp5p-wm45 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 8.2
v2 : unknown
v3 : 8.1

Information

Published : 2022-09-27 15:15

Updated : 2024-11-21 07:17


NVD link : CVE-2022-39258

Mitre link : CVE-2022-39258

CVE.ORG link : CVE-2022-39258


JSON object : View

Products Affected

mailcow

  • mailcow\
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-451

User Interface (UI) Misrepresentation of Critical Information

CWE-601

URL Redirection to Untrusted Site ('Open Redirect')