Ubuntu Security Notice USN-6550-1
2023-12-12 22:12:8 Author: packetstormsecurity.com(查看原文) 阅读量:6 收藏

==========================================================================
Ubuntu Security Notice USN-6550-1
December 12, 2023

postfixadmin vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS (Available with Ubuntu Pro)
- Ubuntu 20.04 LTS (Available with Ubuntu Pro)
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in PostfixAdmin.

Software Description:
- postfixadmin: Virtual mail hosting interface for Postfix

Details:

It was discovered that Smarty, that is integrated in the PostfixAdmin
code, was not properly sanitizing user input when generating templates. An
attacker could, through PHP injection, possibly use this issue to execute
arbitrary code. (CVE-2022-29221)

It was discovered that Moment.js, that is integrated in the PostfixAdmin
code, was using an inefficient parsing algorithm when processing date
strings in the RFC 2822 standard. An attacker could possibly use this
issue to cause a denial of service. (CVE-2022-31129)

It was discovered that Smarty, that is integrated in the PostfixAdmin
code, was not properly escaping JavaScript code. An attacker could
possibly use this issue to conduct cross-site scripting attacks (XSS).
(CVE-2023-28447)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS (Available with Ubuntu Pro):
postfixadmin 3.3.10-2ubuntu0.1~esm1

Ubuntu 20.04 LTS (Available with Ubuntu Pro):
postfixadmin 3.2.1-3ubuntu0.1~esm1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
postfixadmin 3.0.2-2ubuntu0.1~esm1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6550-1
CVE-2022-29221, CVE-2022-31129, CVE-2023-28447


文章来源: https://packetstormsecurity.com/files/176153/USN-6550-1.txt
如有侵权请联系:admin#unsafe.sh