Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-35179
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Unprivileged Stalwart Mail Server user can read files as root
Source: NVD (National Vulnerability Database)
Vulnerability Description
Stalwart Mail Server is an open-source mail server. Prior to version 0.8.0, when using `RUN_AS_USER`, the specified user (and therefore, web interface admins) can read arbitrary files as root. This issue affects admins who have set up to run stalwart with `RUN_AS_USER` who handed out admin credentials to the mail server but expect these to only grant access according to the `RUN_AS_USER` and are attacked where the attackers managed to achieve Arbitrary Code Execution using another vulnerability. Version 0.8.0 contains a patch for the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
特权放弃/降低错误
Source: NVD (National Vulnerability Database)
Vulnerability Title
Stalwart Mail Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Stalwart Mail Server是Stalwart实验室的一体化邮件服务器。 Stalwart Mail Server 0.8.0 之前版本存在安全漏洞,该漏洞源于当使用 RUN_AS_USER 时,指定用户可以以 root 身份读取任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
stalwartlabsmail-server < 0.8.0 -
II. Public POCs for CVE-2024-35179
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-35179
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-35179

No comments yet


Leave a comment