Lucene search

K
gentooGentoo FoundationGLSA-202006-23
HistoryJun 15, 2020 - 12:00 a.m.

Cyrus IMAP Server: Access restriction bypass

2020-06-1500:00:00
Gentoo Foundation
security.gentoo.org
26

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

44.7%

Background

The Cyrus IMAP Server is an efficient, highly-scalable IMAP e-mail server.

Description

An issue was discovered in Cyrus IMAP Server where sieve script uploading is excessively trusted.

Impact

A user can use a sieve script to create any mailbox with administrator privileges.

Workaround

Disable sieve script uploading until the upgrade is complete.

Resolution

All Cyrus IMAP Server users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-mail/cyrus-imapd-3.0.13"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-mail/cyrus-imapd< 3.0.13UNKNOWN

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

3.5 Low

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

44.7%