First published: Thu Feb 13 2020(Updated: )
In Mailu before version 1.7, an authenticated user can exploit a vulnerability in Mailu fetchmail script and gain full access to a Mailu instance. Mailu servers that have open registration or untrusted users are most impacted. The master and 1.7 branches are patched on our git repository. All Docker images published on docker.io/mailu for tags 1.5, 1.6, 1.7 and master are patched. For detailed instructions about patching and securing the server afterwards, see https://github.com/Mailu/Mailu/issues/1354
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phlymail | <1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5239 is considered a high severity vulnerability due to the potential for an authenticated user to gain full control of a Mailu instance.
To fix CVE-2020-5239, upgrade to Mailu version 1.7 or later, as the vulnerability has been patched in these releases.
Mailu servers that allow open registration or have untrusted users are the most affected by CVE-2020-5239.
Exploitation of CVE-2020-5239 can allow an authenticated user to gain full access to the Mailu instance, including all user data.
There are no known effective workarounds for CVE-2020-5239; upgrading to a patched version is the recommended solution.