漏洞标题
"Stalwart邮件服务器的设计具有权限提升功能"
漏洞描述信息
Stalwart 邮件服务器是一款开源邮件服务器。在版本 0.8.0 之前,任何能够以 stalwart-mail 用户身份执行任意代码(包括 web 接口管理员)的攻击者都能够在系统中获得完全的 root 权限。通常,系统服务是由单独的用户(而非 root)运行的,以此来隔离拥有任意代码执行权限的攻击者,仅限于当前服务。因此,即使发生成功的攻击,其他系统服务和整个系统本身仍会得到保护。然而,stalwart-mail 以独立用户身份运行,但它可以用简单的方式再次赋予自己完全的权限,因此这种保护实际上无效。那些向邮件服务器分发管理权限,但不想向整个系统提供完全的 root 权限的服务器管理员,以及当攻击者利用其他漏洞获得任意代码执行权限时的任何被攻击用户,都可能受到影响。版本 0.8.0 包含了针对此问题的补丁。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
漏洞类别
特权管理不恰当
漏洞标题
Stalwart Mail Server has privilege escalation by design
漏洞描述信息
Stalwart Mail Server is an open-source mail server. Prior to version 0.8.0, attackers who achieved Arbitrary Code Execution as the stalwart-mail user (including web interface admins) can gain complete root access to the system. Usually, system services are run as a separate user (not as root) to isolate an attacker with Arbitrary Code Execution to the current service. Therefore, other system services and the system itself remains protected in case of a successful attack. stalwart-mail runs as a separate user, but it can give itself full privileges again in a simple way, so this protection is practically ineffective. Server admins who handed out the admin credentials to the mail server, but didn't want to hand out complete root access to the system, as well as any attacked user when the attackers gained Arbitrary Code Execution using another vulnerability, may be vulnerable. Version 0.8.0 contains a patch for the issue.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
漏洞类别
授权机制不正确
漏洞标题
Stalwart Mail Server 安全漏洞
漏洞描述信息
Stalwart Mail Server是Stalwart实验室的一体化邮件服务器。 Stalwart Mail Server 0.8.0 之前版本存在安全漏洞,该漏洞源于允许攻击者获得系统的完全 root 访问权限。
CVSS信息
N/A
漏洞类别
其他