cve/2024/CVE-2024-4297.md

20 lines
1.1 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-4297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4297)
![](https://img.shields.io/static/v1?label=Product&message=iSherlock%204.5&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=iSherlock%205.5&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=earlier%3C%204.5-147%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=earlier%3C%205.5-147%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherlock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability to download arbitrary system files.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds