Skip to main content

CVE-2024-24760: CWE-610: Externally Controlled Reference to a Resource in Another Sphere in mailcow mailcow-dockerized

High
VulnerabilityCVE-2024-24760cvecve-2024-24760cwe-610
Published: Fri Feb 02 2024 (02/02/2024, 15:28:22 UTC)
Source: CVE
Vendor/Project: mailcow
Product: mailcow-dockerized

Description

mailcow is a dockerized email package, with multiple containers linked in one bridged network. A security vulnerability has been identified in mailcow affecting versions < 2024-01c. This vulnerability potentially allows attackers on the same subnet to connect to exposed ports of a Docker container, even when the port is bound to 127.0.0.1. The vulnerability has been addressed by implementing additional iptables/nftables rules. These rules drop packets for Docker containers on ports 3306, 6379, 8983, and 12345, where the input interface is not `br-mailcow` and the output interface is `br-mailcow`.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:28:41 UTC

Technical Analysis

CVE-2024-24760 is a high-severity vulnerability affecting mailcow-dockerized versions prior to 2024-01c. mailcow is a popular dockerized email server suite that runs multiple containers interconnected via a bridged Docker network named br-mailcow. The vulnerability arises from insufficient network isolation controls within the Docker bridge network configuration. Specifically, attackers located on the same subnet as the mailcow deployment can bypass the intended localhost (127.0.0.1) binding restrictions on certain container ports. This allows them to connect to exposed service ports inside Docker containers that should only be accessible locally. The affected ports include 3306 (commonly MySQL), 6379 (Redis), 8983 (Solr), and 12345 (a custom or less common service port). The root cause is that Docker’s network filtering rules did not adequately block packets coming from interfaces other than br-mailcow targeting these ports, enabling lateral movement or unauthorized access within the subnet. The vendor addressed this by adding iptables/nftables rules that drop packets destined for these ports if the input interface is not br-mailcow but the output interface is br-mailcow, effectively enforcing network segmentation and preventing external subnet hosts from accessing these internal container services. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring only low privileges (PR:L) but no user interaction. No known exploits are reported in the wild yet. This vulnerability is classified under CWE-610, which relates to externally controlled references to resources in another sphere, highlighting the risk of unauthorized cross-network resource access due to improper isolation.

Potential Impact

For European organizations deploying mailcow-dockerized for email services, this vulnerability poses a significant risk of unauthorized access to critical backend services such as databases (MySQL), caching layers (Redis), and search engines (Solr) that are integral to mailcow’s operation. Exploitation could lead to data breaches exposing sensitive email data, user credentials, or internal configuration information, compromising confidentiality. Attackers could also manipulate or disrupt these services, impacting integrity and availability of the email platform, potentially causing service outages or data corruption. Given mailcow’s popularity among small to medium enterprises and hosting providers in Europe, the vulnerability could facilitate lateral movement within corporate or hosting provider networks, especially in environments where subnet segmentation is weak. This could escalate to broader compromise of organizational IT infrastructure. The lack of required user interaction and the ability to exploit remotely from the same subnet increases the threat level. Although no public exploits are known, the high CVSS score and the critical nature of the affected services warrant urgent attention to prevent potential targeted attacks or insider threats.

Mitigation Recommendations

European organizations should immediately upgrade mailcow-dockerized to version 2024-01c or later, where the vendor has implemented iptables/nftables rules to enforce strict network segmentation. Until upgrades are applied, administrators should manually verify and enforce firewall rules on the host to block inbound traffic to ports 3306, 6379, 8983, and 12345 from any interface other than br-mailcow. Network segmentation should be audited to ensure that only trusted hosts have access to the mailcow subnet. Monitoring network traffic for anomalous connections to these ports can help detect exploitation attempts. Additionally, organizations should review Docker daemon and container network configurations to ensure no unintended port exposures exist. Employing host-based intrusion detection systems (HIDS) and container security tools to monitor for suspicious activity targeting these services is recommended. Regular backups of mailcow data and configurations should be maintained to enable recovery in case of compromise. Finally, restricting administrative access to the mailcow environment and enforcing strong authentication and authorization controls will reduce the risk of privilege escalation and lateral movement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2024-01-29T20:51:26.010Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec2f6

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:28:41 PM

Last updated: 8/15/2025, 9:36:35 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats