2024-12-08 03:06:42 +00:00

121 lines
4.1 KiB
JSON

{
"id": "CVE-2024-3193",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-29T07:15:07.773",
"lastModified": "2024-11-21T09:29:07.243",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in MailCleaner up to 2023.03.14 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Admin Endpoints. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-262309 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en MailCleaner hasta 2023.03.14 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del componente Admin Endpoints es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-262309."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.262309",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.262309",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://vuldb.com/?ctiid.262309",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://vuldb.com/?id.262309",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}