cve/2024/CVE-2024-4296.md
2024-05-25 21:48:12 +02:00

20 lines
1.1 KiB
Markdown

### [CVE-2024-4296](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4296)
![](https://img.shields.io/static/v1?label=Product&message=iSherlock%204.5&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=iSherlock%205.5&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=earlier%3C%204.5-149%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=earlier%3C%205.5-149%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
The account management interface of HGiga iSherlock (including MailSherlock, SpamSherlock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability to download arbitrary system files.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds