Description
Attackers with access to user accounts can inject arbitrary control characters to SIEVE mail-filter rules. This could be abused to access SIEVE extension that are not allowed by App Suite or to inject rules which would break per-user filter processing, requiring manual cleanup of such rules. We have added sanitization to all mail-filter APIs to avoid forwardning control characters to subsystems. No publicly available exploits are known.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-30250 | Attackers with access to user accounts can inject arbitrary control characters to SIEVE mail-filter rules. This could be abused to access SIEVE extension that are not allowed by App Suite or to inject rules which would break per-user filter processing, requiring manual cleanup of such rules. We have added sanitization to all mail-filter APIs to avoid forwardning control characters to subsystems. No publicly available exploits are known. |
References
History
Tue, 15 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2024-10-15T17:11:44.042Z
Reserved: 2023-02-22T20:42:56.089Z
Link: CVE-2023-26430
Updated: 2024-08-02T11:46:24.527Z
Status : Modified
Published: 2023-08-02T13:15:10.217
Modified: 2024-11-21T07:51:25.500
Link: CVE-2023-26430
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD