CVE-2024-30270: mailcow Path Traversal and Arbitrary Code Execution Vulnerability

6.2 CVSS

Description

mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability is a combination of path traversal and arbitrary code execution, specifically targeting the `rspamd_maps()` function. It allows authenticated admin users to overwrite any file writable by the www-data user by exploiting improper path validation. The exploit chain can lead to the execution of arbitrary commands on the server. Version 2024-04 contains a patch for the issue.

Classification

CVE ID: CVE-2024-30270

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.2

Affected Products

Vendor: mailcow

Product: mailcow-dockerized

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 17.83% (scored less or equal to compared to others)

EPSS Date: 2025-02-04 (when was this score calculated)

References

https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-4m8r-87gc-3vvp
https://mailcow.email/posts/2024/release-2024-04
https://www.sonarsource.com/blog/remote-code-execution-in-mailcow-always-sanitize-error-messages

Timeline