cve/2024/CVE-2024-5670.md

21 lines
1.1 KiB
Markdown
Raw Normal View History

2024-08-05 18:41:32 +00:00
### [CVE-2024-5670](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5670)
![](https://img.shields.io/static/v1?label=Product&message=SN%20OS%2010.3&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SN%20OS%2012.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SN%20OS%2012.3&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20230631%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20230922%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
The web services of Softnext's products, Mail SQR Expert and Mail Archiving Expert do not properly validate user input, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the remote server.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/tanjiti/sec_profile