Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.
References
Link | Resource |
---|---|
https://dovecot.org/security | Vendor Advisory |
https://www.openwall.com/lists/oss-security/2021/06/28/1 | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TK424DWFO2TKJYXZ2H3XL633TYJL4GQN/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JB2VTJ3G2ILYWH5Y2FTY2PUHT2MD6VMI/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202107-41 | Third Party Advisory |
Information
Published : 2021-06-28 05:15
Updated : 2021-09-20 11:52
NVD link : CVE-2021-29157
Mitre link : CVE-2021-29157
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
dovecot
- dovecot
fedoraproject
- fedora