2024-07-03 22:04:21 +00:00

68 lines
2.3 KiB
JSON

{
"id": "CVE-2024-4298",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-04-29T03:15:09.810",
"lastModified": "2024-07-03T21:15:04.183",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The email search interface of HGiga iSherlock (including MailSherlock, SpamSherock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability for Command Injection attacks, enabling execution of arbitrary system commands."
},
{
"lang": "es",
"value": "La interfaz de b\u00fasqueda de correo electr\u00f3nico de HGiga iSherlock (incluidos MailSherlock, SpamSherock, AuditSherlock) no filtra caracteres especiales en ciertos par\u00e1metros de funci\u00f3n, lo que permite a atacantes remotos con privilegios administrativos explotar esta vulnerabilidad para ataques de inyecci\u00f3n de comandos, permitiendo la ejecuci\u00f3n de comandos arbitrarios del sistema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.chtsecurity.com/news/4559fabd-43d1-4324-a0b3-f459a05c2290",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.chtsecurity.com/news/f67fd9b5-cb7a-42e4-bcb7-cc1c73d1f851",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7769-0773a-1.html",
"source": "twcert@cert.org.tw"
}
]
}