USN-6550-1: PostfixAdmin vulnerabilities
12 December 2023
Several security issues were fixed in PostfixAdmin.
Releases
Packages
- postfixadmin - Virtual mail hosting interface for Postfix
Details
It was discovered that Smarty, that is integrated in the PostfixAdmin
code, was not properly sanitizing user input when generating templates. An
attacker could, through PHP injection, possibly use this issue to execute
arbitrary code. (CVE-2022-29221)
It was discovered that Moment.js, that is integrated in the PostfixAdmin
code, was using an inefficient parsing algorithm when processing date
strings in the RFC 2822 standard. An attacker could possibly use this
issue to cause a denial of service. This issue only affected Ubuntu 22.04
LTS. (CVE-2022-31129)
It was discovered that Smarty, that is integrated in the PostfixAdmin
code, was not properly escaping JavaScript code. An attacker could
possibly use this issue to conduct cross-site scripting attacks (XSS).
(CVE-2023-28447)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
postfixadmin
-
3.3.10-2ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 20.04
-
postfixadmin
-
3.2.1-3ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 18.04
-
postfixadmin
-
3.0.2-2ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5559-1: node-moment, libjs-moment
- USN-6012-1: smarty3