Lucene search

K
gentooGentoo FoundationGLSA-202006-23
HistoryJun 15, 2020 - 12:00 a.m.

Cyrus IMAP Server: Access restriction bypass

2020-06-1500:00:00
Gentoo Foundation
security.gentoo.org
31

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

45.4%

Background

The Cyrus IMAP Server is an efficient, highly-scalable IMAP e-mail server.

Description

An issue was discovered in Cyrus IMAP Server where sieve script uploading is excessively trusted.

Impact

A user can use a sieve script to create any mailbox with administrator privileges.

Workaround

Disable sieve script uploading until the upgrade is complete.

Resolution

All Cyrus IMAP Server users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-mail/cyrus-imapd-3.0.13"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-mail/cyrus-imapd< 3.0.13UNKNOWN

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

45.4%