Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-23824
HistoryFeb 02, 2024 - 3:18 p.m.

CVE-2024-23824 mailcow ipixel flood attack leads to Denial of Service in admin page

2024-02-0215:18:55
CWE-400
GitHub_M
www.cve.org
cve-2024-23824
mailcow
pixel flood
dos
admin page
dockerized email package
bridged network
vulnerability
payload
logo
slow
unresponsive
version 2023-12a
version 2024-01

4.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.9%

mailcow is a dockerized email package, with multiple containers linked in one bridged network. The application is vulnerable to pixel flood attack, once the payload has been successfully uploaded in the logo the application goes slow and doesn’t respond in the admin page. It is tested on the versions 2023-12a and prior and patched in version 2024-01.

CNA Affected

[
  {
    "vendor": "mailcow",
    "product": "mailcow-dockerized",
    "versions": [
      {
        "version": "< 2024-01",
        "status": "affected"
      }
    ]
  }
]

4.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.9%

Related for CVELIST:CVE-2024-23824