Lucene search

K
cve[email protected]CVE-2024-3196
HistoryApr 29, 2024 - 7:15 a.m.

CVE-2024-3196

2024-04-2907:15:08
CWE-78
web.nvd.nist.gov
27
vulnerability
mailcleaner
os command injection
soap service
local access
patch
nvd

6.5 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

MULTIPLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:M/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.2%

A vulnerability was found in MailCleaner up to 2023.03.14. It has been declared as critical. This vulnerability affects the function getStats/Services_silentDump/Services_stopStartMTA/Config_saveDateTime/Config_hostid/Logs_StartGetStat/dumpConfiguration of the component SOAP Service. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262312.

Affected configurations

Vulners
Node
mailcleanermailcleanerMatch2023.03.0
OR
mailcleanermailcleanerMatch2023.03.1
OR
mailcleanermailcleanerMatch2023.03.2
OR
mailcleanermailcleanerMatch2023.03.3
OR
mailcleanermailcleanerMatch2023.03.4
OR
mailcleanermailcleanerMatch2023.03.5
OR
mailcleanermailcleanerMatch2023.03.6
OR
mailcleanermailcleanerMatch2023.03.7
OR
mailcleanermailcleanerMatch2023.03.8
OR
mailcleanermailcleanerMatch2023.03.9
OR
mailcleanermailcleanerMatch2023.03.10
OR
mailcleanermailcleanerMatch2023.03.11
OR
mailcleanermailcleanerMatch2023.03.12
OR
mailcleanermailcleanerMatch2023.03.13
OR
mailcleanermailcleanerMatch2023.03.14
VendorProductVersionCPE
mailcleanermailcleaner2023.03.0cpe:2.3:a:mailcleaner:mailcleaner:2023.03.0:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.1cpe:2.3:a:mailcleaner:mailcleaner:2023.03.1:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.2cpe:2.3:a:mailcleaner:mailcleaner:2023.03.2:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.3cpe:2.3:a:mailcleaner:mailcleaner:2023.03.3:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.4cpe:2.3:a:mailcleaner:mailcleaner:2023.03.4:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.5cpe:2.3:a:mailcleaner:mailcleaner:2023.03.5:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.6cpe:2.3:a:mailcleaner:mailcleaner:2023.03.6:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.7cpe:2.3:a:mailcleaner:mailcleaner:2023.03.7:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.8cpe:2.3:a:mailcleaner:mailcleaner:2023.03.8:*:*:*:*:*:*:*
mailcleanermailcleaner2023.03.9cpe:2.3:a:mailcleaner:mailcleaner:2023.03.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 151

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "MailCleaner",
    "versions": [
      {
        "version": "2023.03.0",
        "status": "affected"
      },
      {
        "version": "2023.03.1",
        "status": "affected"
      },
      {
        "version": "2023.03.2",
        "status": "affected"
      },
      {
        "version": "2023.03.3",
        "status": "affected"
      },
      {
        "version": "2023.03.4",
        "status": "affected"
      },
      {
        "version": "2023.03.5",
        "status": "affected"
      },
      {
        "version": "2023.03.6",
        "status": "affected"
      },
      {
        "version": "2023.03.7",
        "status": "affected"
      },
      {
        "version": "2023.03.8",
        "status": "affected"
      },
      {
        "version": "2023.03.9",
        "status": "affected"
      },
      {
        "version": "2023.03.10",
        "status": "affected"
      },
      {
        "version": "2023.03.11",
        "status": "affected"
      },
      {
        "version": "2023.03.12",
        "status": "affected"
      },
      {
        "version": "2023.03.13",
        "status": "affected"
      },
      {
        "version": "2023.03.14",
        "status": "affected"
      }
    ],
    "modules": [
      "SOAP Service"
    ]
  }
]

6.5 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

MULTIPLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:M/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.2%

Related for CVE-2024-3196