Description
mailcow is a dockerized email package, with multiple containers linked in one bridged network. The application is vulnerable to pixel flood attack, once the payload has been successfully uploaded in the logo the application goes slow and doesn't respond in the admin page. It is tested on the versions 2023-12a and prior and patched in version 2024-01.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-45rv-3c5p-w4h7
Patch x_refsource_misc
https://github.com/mailcow/mailcow-dockerized/commit/7f6f7e0e9ff608618e5b144bcf18d279610aa3ed
Exploit, Third Party Advisory x_refsource_misc
https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack
Scores
CVSS v3
4.7
EPSS
0.0008
EPSS Percentile
24.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-400
Status
published
Products (1)
mailcow/mailcow\
< 2024-01
Published
Feb 02, 2024
Tracked Since
Feb 18, 2026