
Source: MortazaviM
The mailcow project, an open-source email server platform, has addressed a session fixation vulnerability that could allow attackers to hijack user sessions.
The vulnerability, tracked as CVE-2024-56529 and assigned a CVSS score of 7.0 (High), affects mailcow versions up to and including 2024-11b. It stems from the login page’s failure to invalidate existing session identifiers, potentially allowing attackers to set a session identifier in a user’s browser and gain unauthorized access to their account.
“The login page does not invalidate existing session identifiers, instead, it accepts and validates any session identifier stored in the browser,” explains the mailcow security advisory. “After the user logs in, they are authenticated, and the session identifier becomes valid. A remote attacker can then use the same session identifier to access the victim’s web panel.”
This vulnerability is particularly concerning because it can be exploited remotely, even without full HSTS (HTTP Strict Transport Security) adoption. An attacker could potentially trick a user into visiting a malicious website that sets a predetermined session identifier in their browser. When the user subsequently logs into their mailcow web panel, the attacker can use the same session identifier to gain access to their account.
This could allow the attacker to:
- Access sensitive emails and attachments
- Modify mail server configurations
- Send emails on behalf of the compromised user
- Launch further attacks against other users or systems
The mailcow project has released version 2025-01 to address this vulnerability. Users are strongly urged to upgrade to the latest version as soon as possible.