Skip to content

Pixel flood attack leads to Denial of Service in admin page

Moderate
DerLinkman published GHSA-45rv-3c5p-w4h7 Feb 2, 2024

Package

mailcow: dockerized

Affected versions

<= 2023-12b

Patched versions

>= 2024-01

Description

The application is vulnerable to pixel flood attack, once the payload has been successfully uploaded in the logo the application goes slow and doesn't respond in the admin page. It is tested on the versions 2023-12a and prior.

The admin page is the only thing that went unresponsive.
If the logo is not changed successfully then upload any image and then upload the lottapixel.

Impact

The admin will not have access to the admin page, where the admin could not do anything which like complete DOS. This can affect the business of the organisation which is using MailCow where the organisation will be facing unavailability and face some internal issues.

Patches

Patched in Versions >= 2024-01

Workarounds

Securing your Admin Accounts, Not Uploading unknown Images as your mailcow UI Logo

References

Referencing POC: https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

CVE ID

CVE-2024-23824

Weaknesses

No CWEs

Credits