10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
AI Score
Confidence
Low
0.0005 Low
EPSS
Percentile
17.2%
A vulnerability, which was classified as critical, has been found in MailCleaner up to 2023.03.14. This issue affects some unknown processing of the component Email Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262307.
Vendor | Product | Version | CPE |
---|---|---|---|
mailcleaner | mailcleaner | 2023.03.0 | cpe:2.3:a:mailcleaner:mailcleaner:2023.03.0:*:*:*:*:*:*:* |
mailcleaner | mailcleaner | 2023.03.1 | cpe:2.3:a:mailcleaner:mailcleaner:2023.03.1:*:*:*:*:*:*:* |
mailcleaner | mailcleaner | 2023.03.2 | cpe:2.3:a:mailcleaner:mailcleaner:2023.03.2:*:*:*:*:*:*:* |
mailcleaner | mailcleaner | 2023.03.3 | cpe:2.3:a:mailcleaner:mailcleaner:2023.03.3:*:*:*:*:*:*:* |
mailcleaner | mailcleaner | 2023.03.4 | cpe:2.3:a:mailcleaner:mailcleaner:2023.03.4:*:*:*:*:*:*:* |
mailcleaner | mailcleaner | 2023.03.5 | cpe:2.3:a:mailcleaner:mailcleaner:2023.03.5:*:*:*:*:*:*:* |
mailcleaner | mailcleaner | 2023.03.6 | cpe:2.3:a:mailcleaner:mailcleaner:2023.03.6:*:*:*:*:*:*:* |
mailcleaner | mailcleaner | 2023.03.7 | cpe:2.3:a:mailcleaner:mailcleaner:2023.03.7:*:*:*:*:*:*:* |
mailcleaner | mailcleaner | 2023.03.8 | cpe:2.3:a:mailcleaner:mailcleaner:2023.03.8:*:*:*:*:*:*:* |
mailcleaner | mailcleaner | 2023.03.9 | cpe:2.3:a:mailcleaner:mailcleaner:2023.03.9:*:*:*:*:*:*:* |
[
{
"vendor": "n/a",
"product": "MailCleaner",
"versions": [
{
"version": "2023.03.0",
"status": "affected"
},
{
"version": "2023.03.1",
"status": "affected"
},
{
"version": "2023.03.2",
"status": "affected"
},
{
"version": "2023.03.3",
"status": "affected"
},
{
"version": "2023.03.4",
"status": "affected"
},
{
"version": "2023.03.5",
"status": "affected"
},
{
"version": "2023.03.6",
"status": "affected"
},
{
"version": "2023.03.7",
"status": "affected"
},
{
"version": "2023.03.8",
"status": "affected"
},
{
"version": "2023.03.9",
"status": "affected"
},
{
"version": "2023.03.10",
"status": "affected"
},
{
"version": "2023.03.11",
"status": "affected"
},
{
"version": "2023.03.12",
"status": "affected"
},
{
"version": "2023.03.13",
"status": "affected"
},
{
"version": "2023.03.14",
"status": "affected"
}
],
"modules": [
"Email Handler"
]
}
]
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
AI Score
Confidence
Low
0.0005 Low
EPSS
Percentile
17.2%