Lucene search

K
prionPRIOn knowledge basePRION:CVE-2020-5239
HistoryFeb 13, 2020 - 1:15 a.m.

Open redirect

2020-02-1301:15:00
PRIOn knowledge base
www.prio-n.com
13

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.1%

In Mailu before version 1.7, an authenticated user can exploit a vulnerability in Mailu fetchmail script and gain full access to a Mailu instance. Mailu servers that have open registration or untrusted users are most impacted. The master and 1.7 branches are patched on our git repository. All Docker images published on docker.io/mailu for tags 1.5, 1.6, 1.7 and master are patched. For detailed instructions about patching and securing the server afterwards, see https://github.com/Mailu/Mailu/issues/1354

CPENameOperatorVersion
mailult1.7

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.1%

Related for PRION:CVE-2020-5239