icon

We found results for “

CVE-2024-35179

Date: May 15, 2024

Stalwart Mail Server is an open-source mail server. Prior to version 0.8.0, when using "RUN_AS_USER", the specified user (and therefore, web interface admins) can read arbitrary files as root. This issue affects admins who have set up to run stalwart with "RUN_AS_USER" who handed out admin credentials to the mail server but expect these to only grant access according to the "RUN_AS_USER" and are attacked where the attackers managed to achieve Arbitrary Code Execution using another vulnerability. Version 0.8.0 contains a patch for the issue.

Language: RUST

Severity Score

Severity Score

Weakness Type (CWE)

Privilege Dropping / Lowering Errors

CWE-271

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us