Description
A remote attacker with general user privilege can inject malicious code in the form content of Raiden MAILD Mail Server website. Other users export form content as CSV file can trigger arbitrary code execution and allow the attacker to perform arbitrary system operation or disrupt service on the user side.
Published: 2022-11-29
Score: 8 High
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Update version to v4.7.4

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-44861 A remote attacker with general user privilege can inject malicious code in the form content of Raiden MAILD Mail Server website. Other users export form content as CSV file can trigger arbitrary code execution and allow the attacker to perform arbitrary system operation or disrupt service on the user side.
History

Fri, 25 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Raidenmaild Raidenmaild
cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2025-04-25T14:42:38.600Z

Reserved: 2022-09-28T00:00:00.000Z

Link: CVE-2022-41675

cve-icon Vulnrichment

Updated: 2024-08-03T12:49:43.449Z

cve-icon NVD

Status : Modified

Published: 2022-11-29T04:15:10.633

Modified: 2024-11-21T07:23:37.140

Link: CVE-2022-41675

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses