cve/2024/CVE-2024-4296.md

20 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-4296](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4296)
![](https://img.shields.io/static/v1?label=Product&message=iSherlock%204.5&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=iSherlock%205.5&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=earlier%3C%204.5-149%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=earlier%3C%205.5-149%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
The account management interface of HGiga iSherlock (including MailSherlock, SpamSherlock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability to download arbitrary system files.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds