CVE-2021-20247

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-20247
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-20247.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-20247
Related
Published
2021-02-23T19:15:13Z
Modified
2024-11-21T05:46:12Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in mbsync before v1.3.5 and v1.4.1. Validations of the mailbox names returned by IMAP LIST/LSUB do not occur allowing a malicious or compromised server to use specially crafted mailbox names containing '..' path components to access data outside the designated mailbox on the opposite end of the synchronization channel. The highest threat from this vulnerability is to data confidentiality and integrity.

References

Affected packages

Debian:11 / isync

Package

Name
isync
Purl
pkg:deb/debian/isync?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / isync

Package

Name
isync
Purl
pkg:deb/debian/isync?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / isync

Package

Name
isync
Purl
pkg:deb/debian/isync?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.0-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}