2024-12-08 03:06:42 +00:00

121 lines
4.0 KiB
JSON

{
"id": "CVE-2024-3191",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-29T07:15:07.080",
"lastModified": "2024-11-21T09:29:06.920",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in MailCleaner up to 2023.03.14. This issue affects some unknown processing of the component Email Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262307."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en MailCleaner hasta 2023.03.14 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del componente Email Handler. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-262307."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 10.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.262307",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.262307",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://vuldb.com/?ctiid.262307",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://vuldb.com/?id.262307",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}