First published: Mon Feb 15 2021(Updated: )
A flaw was found in mbsync before v1.3.5 and v1.4.1. mbsync doesn't validate the mailbox names returned by IMAP LIST/LSUB, which allows a malicious/compromised server to use specially crafted mailbox names containing '..' path components to access data outside the designated mailbox on the opposite end of the synchronization channel.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mbsync | <1.35 | 1.35 |
redhat/mbsync | <1.4.1 | 1.4.1 |
Mbsync Project Mbsync | <1.3.5 | |
Mbsync Project Mbsync | >=1.4.0<1.4.1 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2021-20247.
The severity rating of CVE-2021-20247 is 7.4 (high).
mbsync versions before v1.3.5 and v1.4.1 are affected by this vulnerability.
A malicious server can exploit this vulnerability by using specially crafted mailbox names containing '..' path components to access data outside the designated mailbox.
Yes, you can find references for CVE-2021-20247 at the following links: [Reference 1](https://www.openwall.com/lists/oss-security/2021/02/22/1), [Reference 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1931598), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1931597).