mailcow: dockerized is an open source groupware/email suite based on docker. An authenticated admin user can inject a JavaScript payload into the Relay Hosts configuration. The injected payload is executed whenever the configuration page is viewed, enabling the attacker to execute arbitrary scripts in the context of the user's browser. This could lead to data theft, or further exploitation. This issue has been addressed in the `2024-07` release. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mailcow
Mailcow mailcow\ |
|
CPEs | cpe:2.3:a:mailcow:mailcow\:_dockerized:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mailcow
Mailcow mailcow\ |
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-08-05T19:59:48.492Z
Updated: 2024-08-05T20:47:28.482Z
Reserved: 2024-07-24T16:51:40.951Z
Link: CVE-2024-41960
Vulnrichment
Updated: 2024-08-05T20:47:24.749Z
NVD
Status : Analyzed
Published: 2024-08-05T20:15:36.477
Modified: 2024-09-19T20:01:58.633
Link: CVE-2024-41960
Redhat
No data.