Description
HGiga MailSherlock query function for connection log has a vulnerability of insufficient filtering for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject and execute arbitrary system commands to perform arbitrary system operation or disrupt service.
No analysis available yet.
Remediation
Vendor Solution
Update MailSherlock package version to iSherlock-sysinfo-4.5-133.386
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-28831 | HGiga MailSherlock query function for connection log has a vulnerability of insufficient filtering for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject and execute arbitrary system commands to perform arbitrary system operation or disrupt service. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-6960-fc2fe-1.html |
|
History
Wed, 19 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-02-19T15:55:17.853Z
Reserved: 2023-01-31T00:00:00.000Z
Link: CVE-2023-24841
Updated: 2024-08-02T11:03:19.289Z
Status : Modified
Published: 2023-03-27T04:15:10.167
Modified: 2024-11-21T07:48:30.200
Link: CVE-2023-24841
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD