mailcow is a dockerized email package, with multiple containers linked in one bridged network. A security vulnerability has been identified in mailcow affecting versions < 2024-01c. This vulnerability potentially allows attackers on the same subnet to connect to exposed ports of a Docker container, even when the port is bound to 127.0.0.1. The vulnerability has been addressed by implementing additional iptables/nftables rules. These rules drop packets for Docker containers on ports 3306, 6379, 8983, and 12345, where the input interface is not `br-mailcow` and the output interface is `br-mailcow`.
References
Link | Resource |
---|---|
https://github.com/mailcow/mailcow-dockerized/commit/087481ac12bfa5dd715f3630f0b1697be94f7e88 | Patch |
https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-gmpj-5xcm-xxx6 | Mitigation Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-02-02T15:28:22.086Z
Updated: 2024-02-02T15:28:22.086Z
Reserved: 2024-01-29T20:51:26.010Z
Link: CVE-2024-24760
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-02-02T16:15:56.163
Modified: 2024-02-10T04:04:55.743
Link: CVE-2024-24760
JSON object: View
Redhat Information
No data.
CWE