Link: https://github.com/OrangeJuiceHU/CVE-2024-41958-PoC
"This is a small proof of concept for CVE-2024-41958
.
It is possible to bypass the TFA authentication on the admin panel.
Affected versions: < 2024-07
Prerequisites needed for the CVE to function:
Password
andusername
for an account without TFA.Password
andusername
for an account which has TFA enabled.- Mailcow version below
2024-07
.
How to use the poc:
- Install the dependency
pip install -r requirements.txt
- Fill in the necessary informations in the sript
- URL
- Password and username for the user who does not have TFA enabled
- Password and username for the user who has TFA enabled
- Run the script
python poc.py
The output if the script works fine:
PoC works!
PHPSESSID=6cd6779a5e499a0e7708aed3aae9d3a4
- Copy the
PHPSESSID
and set the cookie in your browser
- Refresh the page
- You are now logged in as the user with TFA enabled"