vendor:
modoboa
by:
7h3h4ckv157
9.8
CVSS
CRITICAL
Authentication Bypass by Primary Weakness
287
CWE
Product Name: modoboa
Affected Version From: modoboa/modoboa prior to 2.0.4
Affected Version To: modoboa/modoboa prior to 2.0.4
Patch Exists: YES
Related CWE: CVE-2023-0777
CPE: modoboa/modoboa
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=90096, https://www.infosecmatter.com/nessus-plugin-library/?id=106608, https://www.infosecmatter.com/nessus-plugin-library/?id=123451, https://www.infosecmatter.com/nessus-plugin-library/?id=90097, https://www.infosecmatter.com/nessus-plugin-library/?id=87962, https://www.infosecmatter.com/nessus-plugin-library/?id=88129, https://www.infosecmatter.com/nessus-plugin-library/?id=87938, https://www.infosecmatter.com/nessus-plugin-library/?id=87934, https://www.infosecmatter.com/nessus-plugin-library/?id=89505, https://www.infosecmatter.com/nessus-plugin-library/?id=89559
Platforms Tested: Arch Linux
2023
modoboa 2.0.4 – Admin TakeOver
modoboa/modoboa prior to 2.0.4 is vulnerable to an authentication bypass by primary weakness. An attacker can exploit this vulnerability by sending a POST request with the admin's username and a password from a wordlist. If the password is correct, the attacker will be able to take over the admin's account.
Mitigation:
Upgrade modoboa/modoboa to version 2.0.4 or later.