Vulnerability Description
mailcow before 2022-05d allows a remote authenticated user to inject OS commands and escalate privileges to domain admin via the --debug option in conjunction with the ---PIPEMESS option in Sync Jobs.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailcow | Mailcow\ | < 2022-05d, _dockerized |
Related Weaknesses (CWE)
References
- https://github.com/ly1g3/Mailcow-CVE-2022-31245ExploitPatchThird Party Advisory
- https://github.com/mailcow/mailcow-dockerized/releases/tag/2022-05dPatchRelease NotesThird Party Advisory
- https://github.com/ly1g3/Mailcow-CVE-2022-31245ExploitPatchThird Party Advisory
- https://github.com/mailcow/mailcow-dockerized/releases/tag/2022-05dPatchRelease NotesThird Party Advisory
FAQ
What is CVE-2022-31245?
CVE-2022-31245 is a vulnerability with a CVSS score of 8.8 (HIGH). mailcow before 2022-05d allows a remote authenticated user to inject OS commands and escalate privileges to domain admin via the --debug option in conjunction with the ---PIPEMESS option in Sync Jobs.
How severe is CVE-2022-31245?
CVE-2022-31245 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-31245?
Check the references section above for vendor advisories and patch information. Affected products include: Mailcow Mailcow\.