mailcow: dockerized is an open source groupware/email suite based on docker. An unauthenticated attacker can inject a JavaScript payload into the API logs. This payload is executed whenever the API logs page is viewed, potentially allowing an attacker to run malicious scripts in the context of the user's browser. This could lead to unauthorized actions, data theft, or further exploitation of the affected system. This issue has been addressed in the `2024-07` release. All users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Thu, 19 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Mailcow
Mailcow mailcow\
CPEs cpe:2.3:a:mailcow:mailcow\:_dockerized:*:*:*:*:*:*:*:*
Vendors & Products Mailcow
Mailcow mailcow\

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-08-05T19:59:46.318Z

Updated: 2024-08-05T20:24:22.327Z

Reserved: 2024-07-24T16:51:40.951Z

Link: CVE-2024-41959

cve-icon Vulnrichment

Updated: 2024-08-05T20:24:19.103Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-05T20:15:36.270

Modified: 2024-09-19T20:14:02.963

Link: CVE-2024-41959

cve-icon Redhat

No data.