Lucene search

K
cve[email protected]CVE-2024-3193
HistoryApr 29, 2024 - 7:15 a.m.

CVE-2024-3193

2024-04-2907:15:07
CWE-78
web.nvd.nist.gov
28
mailcleaner
critical vulnerability
os command injection
remote attack
patch
vdb-262309

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.2%

A vulnerability has been found in MailCleaner up to 2023.03.14 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Admin Endpoints. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-262309 was assigned to this vulnerability.

Affected configurations

Vulners
Node
mailcleanermailcleanerMatch2023.03.0
OR
mailcleanermailcleanerMatch2023.03.1
OR
mailcleanermailcleanerMatch2023.03.2
OR
mailcleanermailcleanerMatch2023.03.3
OR
mailcleanermailcleanerMatch2023.03.4
OR
mailcleanermailcleanerMatch2023.03.5
OR
mailcleanermailcleanerMatch2023.03.6
OR
mailcleanermailcleanerMatch2023.03.7
OR
mailcleanermailcleanerMatch2023.03.8
OR
mailcleanermailcleanerMatch2023.03.9
OR
mailcleanermailcleanerMatch2023.03.10
OR
mailcleanermailcleanerMatch2023.03.11
OR
mailcleanermailcleanerMatch2023.03.12
OR
mailcleanermailcleanerMatch2023.03.13
OR
mailcleanermailcleanerMatch2023.03.14
VendorProductVersionCPE
mailcleanermailcleaner2023.03.0cpe:2.3:a:mailcleaner:mailcleaner:2023.03.0:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.1cpe:2.3:a:mailcleaner:mailcleaner:2023.03.1:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.2cpe:2.3:a:mailcleaner:mailcleaner:2023.03.2:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.3cpe:2.3:a:mailcleaner:mailcleaner:2023.03.3:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.4cpe:2.3:a:mailcleaner:mailcleaner:2023.03.4:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.5cpe:2.3:a:mailcleaner:mailcleaner:2023.03.5:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.6cpe:2.3:a:mailcleaner:mailcleaner:2023.03.6:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.7cpe:2.3:a:mailcleaner:mailcleaner:2023.03.7:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.8cpe:2.3:a:mailcleaner:mailcleaner:2023.03.8:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.9cpe:2.3:a:mailcleaner:mailcleaner:2023.03.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 151

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "MailCleaner",
    "versions": [
      {
        "version": "2023.03.0",
        "status": "affected"
      },
      {
        "version": "2023.03.1",
        "status": "affected"
      },
      {
        "version": "2023.03.2",
        "status": "affected"
      },
      {
        "version": "2023.03.3",
        "status": "affected"
      },
      {
        "version": "2023.03.4",
        "status": "affected"
      },
      {
        "version": "2023.03.5",
        "status": "affected"
      },
      {
        "version": "2023.03.6",
        "status": "affected"
      },
      {
        "version": "2023.03.7",
        "status": "affected"
      },
      {
        "version": "2023.03.8",
        "status": "affected"
      },
      {
        "version": "2023.03.9",
        "status": "affected"
      },
      {
        "version": "2023.03.10",
        "status": "affected"
      },
      {
        "version": "2023.03.11",
        "status": "affected"
      },
      {
        "version": "2023.03.12",
        "status": "affected"
      },
      {
        "version": "2023.03.13",
        "status": "affected"
      },
      {
        "version": "2023.03.14",
        "status": "affected"
      }
    ],
    "modules": [
      "Admin Endpoints"
    ]
  }
]

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.2%

Related for CVE-2024-3193