Lucene search

K
cvelistVulDBCVELIST:CVE-2024-3193
HistoryApr 29, 2024 - 6:22 a.m.

CVE-2024-3193 MailCleaner Admin Endpoints os command injection

2024-04-2906:22:38
CWE-78
VulDB
www.cve.org
mailcleaner
admin endpoints
os command injection
vulnerability
critical
remote attack
patch
vdb-262309

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.2%

A vulnerability has been found in MailCleaner up to 2023.03.14 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Admin Endpoints. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-262309 was assigned to this vulnerability.

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "MailCleaner",
    "versions": [
      {
        "version": "2023.03.0",
        "status": "affected"
      },
      {
        "version": "2023.03.1",
        "status": "affected"
      },
      {
        "version": "2023.03.2",
        "status": "affected"
      },
      {
        "version": "2023.03.3",
        "status": "affected"
      },
      {
        "version": "2023.03.4",
        "status": "affected"
      },
      {
        "version": "2023.03.5",
        "status": "affected"
      },
      {
        "version": "2023.03.6",
        "status": "affected"
      },
      {
        "version": "2023.03.7",
        "status": "affected"
      },
      {
        "version": "2023.03.8",
        "status": "affected"
      },
      {
        "version": "2023.03.9",
        "status": "affected"
      },
      {
        "version": "2023.03.10",
        "status": "affected"
      },
      {
        "version": "2023.03.11",
        "status": "affected"
      },
      {
        "version": "2023.03.12",
        "status": "affected"
      },
      {
        "version": "2023.03.13",
        "status": "affected"
      },
      {
        "version": "2023.03.14",
        "status": "affected"
      }
    ],
    "modules": [
      "Admin Endpoints"
    ]
  }
]

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.2%

Related for CVELIST:CVE-2024-3193