Lucene search

K
vulnrichmentTwcertVULNRICHMENT:CVE-2024-6048
HistoryJun 17, 2024 - 7:28 a.m.

CVE-2024-6048 Openfind MailGates and MailAudit - OS Command Injection

2024-06-1707:28:48
CWE-78
twcert
github.com
1
openfind
mailgates
mailaudit
command injection
vulnerability
remote attacker
system commands
email attachments
unauthenticated

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Openfind’s MailGates and MailAudit fail to properly filter user input when analyzing email attachments. An unauthenticated remote attacker can exploit this vulnerability to inject system commands and execute them on the remote server.

CNA Affected

[
  {
    "vendor": "Openfind",
    "product": "MailGates 5.0",
    "versions": [
      {
        "status": "affected",
        "version": "earlier",
        "lessThan": "Patch 5.2.10.094",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "Openfind",
    "product": "MailAudit 5.0",
    "versions": [
      {
        "status": "affected",
        "version": "earlier",
        "lessThan": "Patch 5.2.10.094",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "Openfind",
    "product": "MailGates 6.0",
    "versions": [
      {
        "status": "affected",
        "version": "earlier",
        "lessThan": "Patch 6.1.7.037",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "Openfind",
    "product": "MailAudit 6.0",
    "versions": [
      {
        "status": "affected",
        "version": "earlier",
        "lessThan": "Patch 6.1.7.037",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:openfind:mailgates:*:*:*:*:*:*:*:*"
    ],
    "vendor": "openfind",
    "product": "mailgates",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "5.2.10.094",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:openfind:mailaudit:*:*:*:*:*:*:*:*"
    ],
    "vendor": "openfind",
    "product": "mailaudit",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "5.2.10.094",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:openfind:mailgates:*:*:*:*:*:*:*:*"
    ],
    "vendor": "openfind",
    "product": "mailgates",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "6.1.7.037",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:openfind:mailaudit:*:*:*:*:*:*:*:*"
    ],
    "vendor": "openfind",
    "product": "mailaudit",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "6.1.7.037",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-6048