CVE-2022-31138
OS Command Injection in mailcow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an extended privilege vulnerability can be exploited by manipulating the custom parameters regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, or maxlinelengthcmd to execute arbitrary code. Users should update their mailcow instances with the `update.sh` script in the mailcow root directory to 2022-06a or newer to receive a patch for this issue. As a temporary workaround, the Syncjob ACL can be removed from all mailbox users, preventing changes to those settings.
mailcow es una suite de servidores de correo. En versiones anteriores a 2022-06a de mailcow-dockerized, una vulnerabilidad de privilegio extendido puede ser explotada al manipular los parámetros personalizados regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, o maxlinelengthcmd para ejecutar código arbitrario. Los usuarios deben actualizar sus instancias de mailcow con el script "update.sh" en el directorio root de mailcow a 2022-06a o más reciente para recibir un parche para este problema. Como mitigación solución temporal, puede eliminarse la ACL de Syncjob de todos los usuarios de buzones de correo, impidiendo que sean realizados cambios en dicha configuración
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-18 CVE Reserved
- 2022-07-11 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2025-01-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/mailcow/mailcow-dockerized/releases/tag/2022-06a | Release Notes | |
https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-vx9w-h33p-5vhc | Mitigation |
URL | Date | SRC |
---|---|---|
https://github.com/ly1g3/Mailcow-CVE-2022-31138 | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://github.com/mailcow/mailcow-dockerized/commit/d373164e13a14e058f82c9f1918a5612f375a9f9 | 2022-07-18 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mailcow Search vendor "Mailcow" | Mailcow: Dockerized Search vendor "Mailcow" for product "Mailcow: Dockerized" | < 2022-06a Search vendor "Mailcow" for product "Mailcow: Dockerized" and version " < 2022-06a" | - |
Affected
|