All the vulnerabilites related to modoboa - modoboa/modoboa
cve-2023-5688
Vulnerability from cvelistv5
Published
2023-10-20 16:22
Modified
2024-09-11 18:34
Severity ?
EPSS score ?
Summary
Cross-site Scripting (XSS) - DOM in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:07:32.628Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.com/bounties/0ceb10e4-952b-4ca4-baf8-5b6f12e3a8a7" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/d33d3cd2d11dbfebd8162c46e2c2a9873919a967" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:modoboa:*:*" ], "defaultStatus": "unknown", "product": "modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-5688", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-11T18:27:54.588911Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T18:34:05.877Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T16:22:46.873Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.com/bounties/0ceb10e4-952b-4ca4-baf8-5b6f12e3a8a7" }, { "url": "https://github.com/modoboa/modoboa/commit/d33d3cd2d11dbfebd8162c46e2c2a9873919a967" } ], "source": { "advisory": "0ceb10e4-952b-4ca4-baf8-5b6f12e3a8a7", "discovery": "EXTERNAL" }, "title": "Cross-site Scripting (XSS) - DOM in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-5688", "datePublished": "2023-10-20T16:22:46.873Z", "dateReserved": "2023-10-20T16:22:43.904Z", "dateUpdated": "2024-09-11T18:34:05.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0398
Vulnerability from cvelistv5
Published
2023-01-19 00:00
Modified
2024-08-02 05:10
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:55.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/0a852351-00ed-44d2-a650-9055b7beed58" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/8e14ac93669df4f35fcdebd55dc9d2f0fed3ed48" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-19T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/0a852351-00ed-44d2-a650-9055b7beed58" }, { "url": "https://github.com/modoboa/modoboa/commit/8e14ac93669df4f35fcdebd55dc9d2f0fed3ed48" } ], "source": { "advisory": "0a852351-00ed-44d2-a650-9055b7beed58", "discovery": "EXTERNAL" }, "title": "Cross-Site Request Forgery (CSRF) in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0398", "datePublished": "2023-01-19T00:00:00", "dateReserved": "2023-01-19T00:00:00", "dateUpdated": "2024-08-02T05:10:55.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0438
Vulnerability from cvelistv5
Published
2023-01-23 00:00
Modified
2024-08-02 05:10
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:56.025Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/07a5b61b-306d-47c4-8ff0-06c540c7dfb3" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/38d778cc71e370216e067d054ce0169ad83078c8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-23T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/07a5b61b-306d-47c4-8ff0-06c540c7dfb3" }, { "url": "https://github.com/modoboa/modoboa/commit/38d778cc71e370216e067d054ce0169ad83078c8" } ], "source": { "advisory": "07a5b61b-306d-47c4-8ff0-06c540c7dfb3", "discovery": "EXTERNAL" }, "title": "Cross-Site Request Forgery (CSRF) in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0438", "datePublished": "2023-01-23T00:00:00", "dateReserved": "2023-01-23T00:00:00", "dateUpdated": "2024-08-02T05:10:56.025Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0406
Vulnerability from cvelistv5
Published
2023-01-19 00:00
Modified
2024-08-02 05:10
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:55.932Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/d7007f76-3dbc-48a7-a2fb-377040fe100c" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/7f0573e917227686d2cc127be1364e2908740807" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-19T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/d7007f76-3dbc-48a7-a2fb-377040fe100c" }, { "url": "https://github.com/modoboa/modoboa/commit/7f0573e917227686d2cc127be1364e2908740807" } ], "source": { "advisory": "d7007f76-3dbc-48a7-a2fb-377040fe100c", "discovery": "EXTERNAL" }, "title": "Cross-Site Request Forgery (CSRF) in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0406", "datePublished": "2023-01-19T00:00:00", "dateReserved": "2023-01-19T00:00:00", "dateUpdated": "2024-08-02T05:10:55.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0777
Vulnerability from cvelistv5
Published
2023-02-10 00:00
Modified
2024-08-02 05:24
Severity ?
EPSS score ?
Summary
Authentication Bypass by Primary Weakness in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:33.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/47d17ac6643f870719691073956a26e4be0a4806" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "CWE-305 Authentication Bypass by Primary Weakness", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-06T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7" }, { "url": "https://github.com/modoboa/modoboa/commit/47d17ac6643f870719691073956a26e4be0a4806" }, { "url": "http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html" } ], "source": { "advisory": "a17e7a9f-0fee-4130-a522-5a0466fc17c7", "discovery": "EXTERNAL" }, "title": "Authentication Bypass by Primary Weakness in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0777", "datePublished": "2023-02-10T00:00:00", "dateReserved": "2023-02-10T00:00:00", "dateUpdated": "2024-08-02T05:24:33.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5689
Vulnerability from cvelistv5
Published
2023-10-20 16:22
Modified
2024-09-11 18:33
Severity ?
EPSS score ?
Summary
Cross-site Scripting (XSS) - DOM in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:07:32.584Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.com/bounties/24835833-3421-412b-bafb-1b7ea3cf60e6" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/d33d3cd2d11dbfebd8162c46e2c2a9873919a967" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:modoboa:*:*" ], "defaultStatus": "unknown", "product": "modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-5689", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-11T18:26:56.824468Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T18:33:08.457Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T16:22:49.430Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.com/bounties/24835833-3421-412b-bafb-1b7ea3cf60e6" }, { "url": "https://github.com/modoboa/modoboa/commit/d33d3cd2d11dbfebd8162c46e2c2a9873919a967" } ], "source": { "advisory": "24835833-3421-412b-bafb-1b7ea3cf60e6", "discovery": "EXTERNAL" }, "title": "Cross-site Scripting (XSS) - DOM in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-5689", "datePublished": "2023-10-20T16:22:49.430Z", "dateReserved": "2023-10-20T16:22:46.666Z", "dateUpdated": "2024-09-11T18:33:08.457Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0470
Vulnerability from cvelistv5
Published
2023-01-26 00:00
Modified
2024-08-02 05:10
Severity ?
EPSS score ?
Summary
Cross-site Scripting (XSS) - Stored in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:10:56.351Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/baae3180-b63b-4880-b2af-1a3f30056c2b" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/354ab6884019009249097a7f3a1881d81ecd2fd2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-26T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/baae3180-b63b-4880-b2af-1a3f30056c2b" }, { "url": "https://github.com/modoboa/modoboa/commit/354ab6884019009249097a7f3a1881d81ecd2fd2" } ], "source": { "advisory": "baae3180-b63b-4880-b2af-1a3f30056c2b", "discovery": "EXTERNAL" }, "title": "Cross-site Scripting (XSS) - Stored in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0470", "datePublished": "2023-01-26T00:00:00", "dateReserved": "2023-01-24T00:00:00", "dateUpdated": "2024-08-02T05:10:56.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2228
Vulnerability from cvelistv5
Published
2023-04-21 00:00
Modified
2024-08-02 06:12
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:12:20.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/619fb490-69ad-4a2a-b686-4c42a62404a9" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/5d886f3d06373d2c3292911bac0772bcd5102343" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.1.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.1.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-21T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/619fb490-69ad-4a2a-b686-4c42a62404a9" }, { "url": "https://github.com/modoboa/modoboa/commit/5d886f3d06373d2c3292911bac0772bcd5102343" } ], "source": { "advisory": "619fb490-69ad-4a2a-b686-4c42a62404a9", "discovery": "EXTERNAL" }, "title": "Cross-Site Request Forgery (CSRF) in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-2228", "datePublished": "2023-04-21T00:00:00", "dateReserved": "2023-04-21T00:00:00", "dateUpdated": "2024-08-02T06:12:20.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0949
Vulnerability from cvelistv5
Published
2023-02-22 00:00
Modified
2024-08-02 05:32
Severity ?
EPSS score ?
Summary
Cross-site Scripting (XSS) - Reflected in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:32:45.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/aa74e9a4a870162eea169e0a6a2eab841f8811b7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.0.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site Scripting (XSS) - Reflected in GitHub repository modoboa/modoboa prior to 2.0.5." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-22T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19" }, { "url": "https://github.com/modoboa/modoboa/commit/aa74e9a4a870162eea169e0a6a2eab841f8811b7" } ], "source": { "advisory": "ef87be4e-493b-4ee9-9738-44c55b8acc19", "discovery": "EXTERNAL" }, "title": "Cross-site Scripting (XSS) - Reflected in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0949", "datePublished": "2023-02-22T00:00:00", "dateReserved": "2023-02-22T00:00:00", "dateUpdated": "2024-08-02T05:32:45.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2160
Vulnerability from cvelistv5
Published
2023-04-18 00:00
Modified
2024-08-02 06:12
Severity ?
EPSS score ?
Summary
Weak Password Requirements in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:12:20.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/54fb6d6a-6b39-45b6-b62a-930260ba484b" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/130257c96a2392ada795785a91178e656e27015c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.1.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Ahmed Hassan (ahmedvienna)" }, { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Josef Hassan (josefjku)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eWeak Password Requirements in GitHub repository modoboa/modoboa prior to 2.1.0.\u003c/p\u003e" } ], "value": "Weak Password Requirements in GitHub repository modoboa/modoboa prior to 2.1.0.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-521", "description": "CWE-521 Weak Password Requirements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-18T10:12:55.186Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntr_ai" }, "references": [ { "url": "https://huntr.dev/bounties/54fb6d6a-6b39-45b6-b62a-930260ba484b" }, { "url": "https://github.com/modoboa/modoboa/commit/130257c96a2392ada795785a91178e656e27015c" } ], "source": { "advisory": "54fb6d6a-6b39-45b6-b62a-930260ba484b", "discovery": "EXTERNAL" }, "title": "Weak Password Requirements in modoboa/modoboa", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-2160", "datePublished": "2023-04-18T00:00:00", "dateReserved": "2023-04-18T00:00:00", "dateUpdated": "2024-08-02T06:12:20.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2227
Vulnerability from cvelistv5
Published
2023-04-21 00:00
Modified
2024-08-02 06:12
Severity ?
EPSS score ?
Summary
Improper Authorization in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:12:20.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/351f9055-2008-4af0-b820-01ff66678bf3" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/7bcd3f6eb264d4e3e01071c97c2bac51cdd6fe97" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.1.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Authorization in GitHub repository modoboa/modoboa prior to 2.1.0." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-21T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/351f9055-2008-4af0-b820-01ff66678bf3" }, { "url": "https://github.com/modoboa/modoboa/commit/7bcd3f6eb264d4e3e01071c97c2bac51cdd6fe97" } ], "source": { "advisory": "351f9055-2008-4af0-b820-01ff66678bf3", "discovery": "EXTERNAL" }, "title": "Improper Authorization in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-2227", "datePublished": "2023-04-21T00:00:00", "dateReserved": "2023-04-21T00:00:00", "dateUpdated": "2024-08-02T06:12:20.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0519
Vulnerability from cvelistv5
Published
2023-01-26 00:00
Modified
2024-08-02 05:17
Severity ?
EPSS score ?
Summary
Cross-site Scripting (XSS) - Stored in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:49.019Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/eef9ab72b5305578a3ad7a7463bd284aa645e98b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-26T00:00:00", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129" }, { "url": "https://github.com/modoboa/modoboa/commit/eef9ab72b5305578a3ad7a7463bd284aa645e98b" } ], "source": { "advisory": "891ad0cb-d12f-4c5e-aac8-d7326caf2129", "discovery": "EXTERNAL" }, "title": "Cross-site Scripting (XSS) - Stored in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-0519", "datePublished": "2023-01-26T00:00:00", "dateReserved": "2023-01-26T00:00:00", "dateUpdated": "2024-08-02T05:17:49.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5690
Vulnerability from cvelistv5
Published
2023-10-20 16:22
Modified
2024-09-11 18:32
Severity ?
EPSS score ?
Summary
Cross-Site Request Forgery (CSRF) in modoboa/modoboa
References
Impacted products
▼ | Vendor | Product |
---|---|---|
modoboa | modoboa/modoboa |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:07:32.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://huntr.com/bounties/980c75a5-d978-4b0e-9bcc-2b2682c97e01" }, { "tags": [ "x_transferred" ], "url": "https://github.com/modoboa/modoboa/commit/23e4c25511c66c0548da001236f47e19e3f9e4d9" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:modoboa:*:*" ], "defaultStatus": "unknown", "product": "modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-5690", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-11T18:26:35.668647Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T18:32:26.708Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "modoboa/modoboa", "vendor": "modoboa", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.2.2." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T16:22:53.540Z", "orgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "shortName": "@huntrdev" }, "references": [ { "url": "https://huntr.com/bounties/980c75a5-d978-4b0e-9bcc-2b2682c97e01" }, { "url": "https://github.com/modoboa/modoboa/commit/23e4c25511c66c0548da001236f47e19e3f9e4d9" } ], "source": { "advisory": "980c75a5-d978-4b0e-9bcc-2b2682c97e01", "discovery": "EXTERNAL" }, "title": "Cross-Site Request Forgery (CSRF) in modoboa/modoboa" } }, "cveMetadata": { "assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a", "assignerShortName": "@huntrdev", "cveId": "CVE-2023-5690", "datePublished": "2023-10-20T16:22:53.540Z", "dateReserved": "2023-10-20T16:22:50.946Z", "dateUpdated": "2024-09-11T18:32:26.708Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }