Skip to content

XSS Vulnerability via Exception Handler

Moderate
FreddleSpl0it published GHSA-fp6h-63w4-5hcm Apr 4, 2024

Package

mailcow: dockerized

Affected versions

< 2024-04

Patched versions

>= 2024-04

Description

Impact

A security vulnerability has been identified in mailcow affecting versions < 2024-04. This vulnerability resides in the exception handling mechanism, specifically when not operating in DEV_MODE. The system saves exception details into a session array without proper sanitization or encoding. These details are later rendered into HTML and executed in a JavaScript block within the user's browser, without adequate escaping of HTML entities. This flaw allows for Cross-Site Scripting (XSS) attacks, where attackers can inject malicious scripts into the admin panel by triggering exceptions with controlled input. The exploitation method involves using any function that might throw an exception with user-controllable argument. This issue can lead to session hijacking and unauthorized administrative actions, posing a significant security risk.

Patches

Versions including 2024-04 and later

Severity

Moderate
6.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

CVE ID

CVE-2024-31204

Weaknesses

No CWEs

Credits