Impact
This vulnerability in Open-Xchange Dovecot Pro allows an attacker to perform path traversal when the service is configured to use per-domain passwd files located just above the system root or with permissive slashes. The flaw permits reading any file ending with 'passwd', such as /etc/passwd. If the file contains authentication credentials, the attacker can gain unauthorized access or make existing system users appear as valid mailbox users. The weakness maps to CWE‑22.
Affected Systems
The flaw affects installations of Open-Xchange GmbH’s OX Dovecot Pro that use the per-domain passwd file configuration described above. No specific version information is supplied, so the issue may apply to all current releases that support such configuration.
Risk and Exploitability
The CVSS base score of 5.3 indicates moderate severity. Exploitability requires the attacker to influence the domain component used in the passwd file path, typically by controlling the domain configuration or spoofing a domain in an authentication attempt. No public exploits are known and the vulnerability is not listed in CISA’s KEV catalog, but the potential for unauthorized file disclosure or authentication bypass warrants timely remediation.
OpenCVE Enrichment
Debian DSA
Ubuntu USN