mailcow 0.14, as used in "mailcow: dockerized" and other products, has CSRF.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/42004/ | exploit vdb entry third party advisory |
https://github.com/mailcow/mailcow-dockerized/pull/268/commits/3c937f75ba5853ada175542d5c4849fb95eb64cd | issue tracking patch |