Search criteria
19 vulnerabilities found for MailCleaner by MailCleaner
VAR-201810-0208
Vulnerability from variot - Updated: 2024-11-23 22:55www/guis/admin/application/controllers/UserController.php in the administration login interface in MailCleaner CE 2018.08 and 2018.09 allows XSS via the admin/login/user/message/ PATH_INFO. MailCleaner CE Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. MailCleanerCE is an open source anti-spam gateway. The product is deployed between the mail infrastructure and the Internet and has features such as virus protection. A cross-site scripting vulnerability exists in the www/guis/admin/application/controllers/UserController.php file that manages the login interface in MailCleanerCE2018.08 and 2010.09. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML by sending PATH_INFO to the admin/login/user/message/ page
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201810-0208",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mailcleaner",
"scope": "eq",
"trust": 2.4,
"vendor": "mailcleaner",
"version": "2018.08"
},
{
"model": "mailcleaner",
"scope": "eq",
"trust": 2.4,
"vendor": "mailcleaner",
"version": "2018.09"
},
{
"model": "ce",
"scope": "eq",
"trust": 0.6,
"vendor": "mailcleaner",
"version": "2018.08"
},
{
"model": "ce",
"scope": "eq",
"trust": 0.6,
"vendor": "mailcleaner",
"version": "2018.09"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-21846"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-011338"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-1227"
},
{
"db": "NVD",
"id": "CVE-2018-18635"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:mailcleaner:mailcleaner",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-011338"
}
]
},
"cve": "CVE-2018-18635",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2018-18635",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-21846",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"id": "CVE-2018-18635",
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-18635",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2018-18635",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2018-21846",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201810-1227",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-21846"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-011338"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-1227"
},
{
"db": "NVD",
"id": "CVE-2018-18635"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "www/guis/admin/application/controllers/UserController.php in the administration login interface in MailCleaner CE 2018.08 and 2018.09 allows XSS via the admin/login/user/message/ PATH_INFO. MailCleaner CE Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. MailCleanerCE is an open source anti-spam gateway. The product is deployed between the mail infrastructure and the Internet and has features such as virus protection. A cross-site scripting vulnerability exists in the www/guis/admin/application/controllers/UserController.php file that manages the login interface in MailCleanerCE2018.08 and 2010.09. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML by sending PATH_INFO to the admin/login/user/message/ page",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-18635"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-011338"
},
{
"db": "CNVD",
"id": "CNVD-2018-21846"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-18635",
"trust": 3.0
},
{
"db": "JVNDB",
"id": "JVNDB-2018-011338",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2018-21846",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201810-1227",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-21846"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-011338"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-1227"
},
{
"db": "NVD",
"id": "CVE-2018-18635"
}
]
},
"id": "VAR-201810-0208",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-21846"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-21846"
}
]
},
"last_update_date": "2024-11-23T22:55:43.630000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Bug fix - Issue #53",
"trust": 0.8,
"url": "https://github.com/MailCleaner/MailCleaner/commit/5f90a52785672fc688c1f85e472e84b8a0d008d8"
},
{
"title": "Security bug - Reflected XSS #53",
"trust": 0.8,
"url": "https://github.com/MailCleaner/MailCleaner/issues/53"
},
{
"title": "Patch for MailCleanerCE Cross-Site Scripting Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/143243"
},
{
"title": "MailCleaner CE Fixes for cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86311"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-21846"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-011338"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-1227"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-011338"
},
{
"db": "NVD",
"id": "CVE-2018-18635"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://github.com/mailcleaner/mailcleaner/commit/5f90a52785672fc688c1f85e472e84b8a0d008d8"
},
{
"trust": 1.6,
"url": "https://github.com/mailcleaner/mailcleaner/issues/53"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-18635"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18635"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-21846"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-011338"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-1227"
},
{
"db": "NVD",
"id": "CVE-2018-18635"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2018-21846"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-011338"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-1227"
},
{
"db": "NVD",
"id": "CVE-2018-18635"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-21846"
},
{
"date": "2019-01-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-011338"
},
{
"date": "2018-10-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201810-1227"
},
{
"date": "2018-10-24T21:29:01.217000",
"db": "NVD",
"id": "CVE-2018-18635"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-21846"
},
{
"date": "2019-01-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-011338"
},
{
"date": "2018-10-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201810-1227"
},
{
"date": "2024-11-21T03:56:16.343000",
"db": "NVD",
"id": "CVE-2018-18635"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201810-1227"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "MailCleaner CE Cross-Site Scripting Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-21846"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-1227"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201810-1227"
}
],
"trust": 0.6
}
}
CVE-2024-3196 (GCVE-0-2024-3196)
Vulnerability from nvd – Published: 2024-04-29 06:22 – Updated: 2024-08-01 20:05- CWE-78 - OS Command Injection
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:mailcleaner:mailcleaner:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mailcleaner",
"vendor": "mailcleaner",
"versions": [
{
"lessThanOrEqual": "2023.03.14",
"status": "affected",
"version": "2023.03.0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3196",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-20T20:51:47.070761Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:30:58.900Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:07.551Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262312 | MailCleaner SOAP Service dumpConfiguration os command injection",
"tags": [
"vdb-entry",
"technical-description",
"x_transferred"
],
"url": "https://vuldb.com/?id.262312"
},
{
"name": "VDB-262312 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262312"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"SOAP Service"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MailCleaner up to 2023.03.14. It has been declared as critical. This vulnerability affects the function getStats/Services_silentDump/Services_stopStartMTA/Config_saveDateTime/Config_hostid/Logs_StartGetStat/dumpConfiguration of the component SOAP Service. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262312."
},
{
"lang": "de",
"value": "In MailCleaner bis 2023.03.14 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Betroffen ist die Funktion getStats/Services_silentDump/Services_stopStartMTA/Config_saveDateTime/Config_hostid/Logs_StartGetStat/dumpConfiguration der Komponente SOAP Service. Mittels Manipulieren mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.5,
"vectorString": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T09:46:39.153Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262312 | MailCleaner SOAP Service dumpConfiguration os command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.262312"
},
{
"name": "VDB-262312 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262312"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T11:45:46.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner SOAP Service dumpConfiguration os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3196",
"datePublished": "2024-04-29T06:22:44.534Z",
"dateReserved": "2024-04-02T14:22:51.446Z",
"dateUpdated": "2024-08-01T20:05:07.551Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3195 (GCVE-0-2024-3195)
Vulnerability from nvd – Published: 2024-04-29 06:22 – Updated: 2024-08-01 20:05- CWE-22 - Path Traversal
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:mailcleaner:mailcleaner:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mailcleaner",
"vendor": "mailcleaner",
"versions": [
{
"status": "affected",
"version": "*"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3195",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-29T11:16:34.962014Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:33:16.869Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:07.504Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262311 | MailCleaner Admin Endpoints path traversal",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://vuldb.com/?id.262311"
},
{
"name": "VDB-262311 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262311"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"Admin Endpoints"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MailCleaner up to 2023.03.14. It has been classified as critical. This affects an unknown part of the component Admin Endpoints. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262311."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in MailCleaner bis 2023.03.14 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Komponente Admin Endpoints. Mittels dem Manipulieren mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5.8,
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T06:22:42.675Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262311 | MailCleaner Admin Endpoints path traversal",
"tags": [
"vdb-entry"
],
"url": "https://vuldb.com/?id.262311"
},
{
"name": "VDB-262311 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262311"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T08:26:32.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner Admin Endpoints path traversal"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3195",
"datePublished": "2024-04-29T06:22:42.675Z",
"dateReserved": "2024-04-02T14:22:48.769Z",
"dateUpdated": "2024-08-01T20:05:07.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3194 (GCVE-0-2024-3194)
Vulnerability from nvd – Published: 2024-04-29 06:22 – Updated: 2024-08-01 20:05- CWE-79 - Cross Site Scripting
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3194",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-29T16:22:27.566395Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:32:57.070Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:07.997Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262310 | MailCleaner Log File Endpoint cross site scripting",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://vuldb.com/?id.262310"
},
{
"name": "VDB-262310 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262310"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"Log File Endpoint"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MailCleaner up to 2023.03.14 and classified as problematic. Affected by this issue is some unknown functionality of the component Log File Endpoint. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-262310 is the identifier assigned to this vulnerability."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in MailCleaner bis 2023.03.14 gefunden. Sie wurde als problematisch eingestuft. Davon betroffen ist unbekannter Code der Komponente Log File Endpoint. Durch Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross Site Scripting",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T06:22:40.854Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262310 | MailCleaner Log File Endpoint cross site scripting",
"tags": [
"vdb-entry"
],
"url": "https://vuldb.com/?id.262310"
},
{
"name": "VDB-262310 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262310"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T08:26:31.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner Log File Endpoint cross site scripting"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3194",
"datePublished": "2024-04-29T06:22:40.854Z",
"dateReserved": "2024-04-02T14:22:45.652Z",
"dateUpdated": "2024-08-01T20:05:07.997Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3193 (GCVE-0-2024-3193)
Vulnerability from nvd – Published: 2024-04-29 06:22 – Updated: 2024-08-01 20:05- CWE-78 - OS Command Injection
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3193",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-29T17:43:34.575455Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:32:33.010Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:07.809Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262309 | MailCleaner Admin Endpoints os command injection",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://vuldb.com/?id.262309"
},
{
"name": "VDB-262309 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262309"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"Admin Endpoints"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in MailCleaner up to 2023.03.14 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Admin Endpoints. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-262309 was assigned to this vulnerability."
},
{
"lang": "de",
"value": "In MailCleaner bis 2023.03.14 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Komponente Admin Endpoints. Durch die Manipulation mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 10,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T06:22:38.861Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262309 | MailCleaner Admin Endpoints os command injection",
"tags": [
"vdb-entry"
],
"url": "https://vuldb.com/?id.262309"
},
{
"name": "VDB-262309 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262309"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T08:26:30.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner Admin Endpoints os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3193",
"datePublished": "2024-04-29T06:22:38.861Z",
"dateReserved": "2024-04-02T14:22:43.107Z",
"dateUpdated": "2024-08-01T20:05:07.809Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3192 (GCVE-0-2024-3192)
Vulnerability from nvd – Published: 2024-04-29 06:22 – Updated: 2024-08-01 20:05- CWE-79 - Cross Site Scripting
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3192",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-29T16:18:13.981404Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:32:27.728Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:08.206Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262308 | MailCleaner Admin Interface cross site scripting",
"tags": [
"vdb-entry",
"technical-description",
"x_transferred"
],
"url": "https://vuldb.com/?id.262308"
},
{
"name": "VDB-262308 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262308"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"Admin Interface"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in MailCleaner up to 2023.03.14. Affected is an unknown function of the component Admin Interface. The manipulation as part of Mail Message leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262308."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in MailCleaner bis 2023.03.14 gefunden. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Komponente Admin Interface. Mit der Manipulation durch Mail Message kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross Site Scripting",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T09:45:06.885Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262308 | MailCleaner Admin Interface cross site scripting",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.262308"
},
{
"name": "VDB-262308 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262308"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T11:45:07.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner Admin Interface cross site scripting"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3192",
"datePublished": "2024-04-29T06:22:37.114Z",
"dateReserved": "2024-04-02T14:22:39.907Z",
"dateUpdated": "2024-08-01T20:05:08.206Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3191 (GCVE-0-2024-3191)
Vulnerability from nvd – Published: 2024-04-29 06:21 – Updated: 2024-08-27 17:34- CWE-78 - OS Command Injection
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:07.514Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262307 | MailCleaner Email os command injection",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://vuldb.com/?id.262307"
},
{
"name": "VDB-262307 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262307"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:mailcleaner:mailcleaner:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mailcleaner",
"vendor": "mailcleaner",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3191",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-30T13:41:22.311410Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-27T17:34:56.094Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"Email Handler"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in MailCleaner up to 2023.03.14. This issue affects some unknown processing of the component Email Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262307."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in MailCleaner bis 2023.03.14 entdeckt. Sie wurde als kritisch eingestuft. Dies betrifft einen unbekannten Teil der Komponente Email Handler. Dank Manipulation mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 10,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T06:21:47.288Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262307 | MailCleaner Email os command injection",
"tags": [
"vdb-entry"
],
"url": "https://vuldb.com/?id.262307"
},
{
"name": "VDB-262307 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262307"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T08:26:26.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner Email os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3191",
"datePublished": "2024-04-29T06:21:47.288Z",
"dateReserved": "2024-04-02T14:22:37.552Z",
"dateUpdated": "2024-08-27T17:34:56.094Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-1010246 (GCVE-0-2019-1010246)
Vulnerability from nvd – Published: 2019-07-18 18:04 – Updated: 2024-08-05 03:07- Unauthenticated MySQL database password information disclosure
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MailCleaner | MailCleaner |
Affected:
before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 [fixed: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9]
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:07:18.487Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/commit/c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "MailCleaner",
"vendor": "MailCleaner",
"versions": [
{
"status": "affected",
"version": "before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 [fixed: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9]"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "MailCleaner before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 is affected by: Unauthenticated MySQL database password information disclosure. The impact is: MySQL database content disclosure (e.g. username, password). The component is: The API call in the function allowAction() in NewslettersController.php. The attack vector is: HTTP Get request. The fixed version is: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Unauthenticated MySQL database password information disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-07-18T18:04:34",
"orgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8",
"shortName": "dwf"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/MailCleaner/MailCleaner/commit/c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"ID": "CVE-2019-1010246",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "MailCleaner",
"version": {
"version_data": [
{
"version_value": "before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 [fixed: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9]"
}
]
}
}
]
},
"vendor_name": "MailCleaner"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "MailCleaner before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 is affected by: Unauthenticated MySQL database password information disclosure. The impact is: MySQL database content disclosure (e.g. username, password). The component is: The API call in the function allowAction() in NewslettersController.php. The attack vector is: HTTP Get request. The fixed version is: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Unauthenticated MySQL database password information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/MailCleaner/MailCleaner/commit/c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9",
"refsource": "MISC",
"url": "https://github.com/MailCleaner/MailCleaner/commit/c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8",
"assignerShortName": "dwf",
"cveId": "CVE-2019-1010246",
"datePublished": "2019-07-18T18:04:34",
"dateReserved": "2019-03-20T00:00:00",
"dateUpdated": "2024-08-05T03:07:18.487Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-20323 (GCVE-0-2018-20323)
Vulnerability from nvd – Published: 2019-03-17 21:38 – Updated: 2024-08-05 11:58- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T11:58:19.133Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/151056/Mailcleaner-Remote-Code-Execution.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "www/soap/application/MCSoap/Logs.php in MailCleaner Community Edition 2018.08 allows remote attackers to execute arbitrary OS commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-03-17T21:38:18",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/151056/Mailcleaner-Remote-Code-Execution.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20323",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "www/soap/application/MCSoap/Logs.php in MailCleaner Community Edition 2018.08 allows remote attackers to execute arbitrary OS commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.com/files/151056/Mailcleaner-Remote-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/151056/Mailcleaner-Remote-Code-Execution.html"
},
{
"name": "https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/",
"refsource": "MISC",
"url": "https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-20323",
"datePublished": "2019-03-17T21:38:18",
"dateReserved": "2018-12-20T00:00:00",
"dateUpdated": "2024-08-05T11:58:19.133Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-18635 (GCVE-0-2018-18635)
Vulnerability from nvd – Published: 2018-10-24 21:00 – Updated: 2024-08-05 11:15- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T11:15:59.757Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/issues/53"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/commit/5f90a52785672fc688c1f85e472e84b8a0d008d8"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-10-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "www/guis/admin/application/controllers/UserController.php in the administration login interface in MailCleaner CE 2018.08 and 2018.09 allows XSS via the admin/login/user/message/ PATH_INFO."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-24T21:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/MailCleaner/MailCleaner/issues/53"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/MailCleaner/MailCleaner/commit/5f90a52785672fc688c1f85e472e84b8a0d008d8"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-18635",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "www/guis/admin/application/controllers/UserController.php in the administration login interface in MailCleaner CE 2018.08 and 2018.09 allows XSS via the admin/login/user/message/ PATH_INFO."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/MailCleaner/MailCleaner/issues/53",
"refsource": "MISC",
"url": "https://github.com/MailCleaner/MailCleaner/issues/53"
},
{
"name": "https://github.com/MailCleaner/MailCleaner/commit/5f90a52785672fc688c1f85e472e84b8a0d008d8",
"refsource": "MISC",
"url": "https://github.com/MailCleaner/MailCleaner/commit/5f90a52785672fc688c1f85e472e84b8a0d008d8"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-18635",
"datePublished": "2018-10-24T21:00:00",
"dateReserved": "2018-10-24T00:00:00",
"dateUpdated": "2024-08-05T11:15:59.757Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3196 (GCVE-0-2024-3196)
Vulnerability from cvelistv5 – Published: 2024-04-29 06:22 – Updated: 2024-08-01 20:05- CWE-78 - OS Command Injection
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:mailcleaner:mailcleaner:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mailcleaner",
"vendor": "mailcleaner",
"versions": [
{
"lessThanOrEqual": "2023.03.14",
"status": "affected",
"version": "2023.03.0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3196",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-20T20:51:47.070761Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:30:58.900Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:07.551Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262312 | MailCleaner SOAP Service dumpConfiguration os command injection",
"tags": [
"vdb-entry",
"technical-description",
"x_transferred"
],
"url": "https://vuldb.com/?id.262312"
},
{
"name": "VDB-262312 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262312"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"SOAP Service"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MailCleaner up to 2023.03.14. It has been declared as critical. This vulnerability affects the function getStats/Services_silentDump/Services_stopStartMTA/Config_saveDateTime/Config_hostid/Logs_StartGetStat/dumpConfiguration of the component SOAP Service. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262312."
},
{
"lang": "de",
"value": "In MailCleaner bis 2023.03.14 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Betroffen ist die Funktion getStats/Services_silentDump/Services_stopStartMTA/Config_saveDateTime/Config_hostid/Logs_StartGetStat/dumpConfiguration der Komponente SOAP Service. Mittels Manipulieren mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.5,
"vectorString": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T09:46:39.153Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262312 | MailCleaner SOAP Service dumpConfiguration os command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.262312"
},
{
"name": "VDB-262312 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262312"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T11:45:46.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner SOAP Service dumpConfiguration os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3196",
"datePublished": "2024-04-29T06:22:44.534Z",
"dateReserved": "2024-04-02T14:22:51.446Z",
"dateUpdated": "2024-08-01T20:05:07.551Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3195 (GCVE-0-2024-3195)
Vulnerability from cvelistv5 – Published: 2024-04-29 06:22 – Updated: 2024-08-01 20:05- CWE-22 - Path Traversal
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:mailcleaner:mailcleaner:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mailcleaner",
"vendor": "mailcleaner",
"versions": [
{
"status": "affected",
"version": "*"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3195",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-29T11:16:34.962014Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:33:16.869Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:07.504Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262311 | MailCleaner Admin Endpoints path traversal",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://vuldb.com/?id.262311"
},
{
"name": "VDB-262311 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262311"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"Admin Endpoints"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MailCleaner up to 2023.03.14. It has been classified as critical. This affects an unknown part of the component Admin Endpoints. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262311."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in MailCleaner bis 2023.03.14 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Komponente Admin Endpoints. Mittels dem Manipulieren mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5.8,
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T06:22:42.675Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262311 | MailCleaner Admin Endpoints path traversal",
"tags": [
"vdb-entry"
],
"url": "https://vuldb.com/?id.262311"
},
{
"name": "VDB-262311 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262311"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T08:26:32.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner Admin Endpoints path traversal"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3195",
"datePublished": "2024-04-29T06:22:42.675Z",
"dateReserved": "2024-04-02T14:22:48.769Z",
"dateUpdated": "2024-08-01T20:05:07.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3194 (GCVE-0-2024-3194)
Vulnerability from cvelistv5 – Published: 2024-04-29 06:22 – Updated: 2024-08-01 20:05- CWE-79 - Cross Site Scripting
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3194",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-29T16:22:27.566395Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:32:57.070Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:07.997Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262310 | MailCleaner Log File Endpoint cross site scripting",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://vuldb.com/?id.262310"
},
{
"name": "VDB-262310 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262310"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"Log File Endpoint"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MailCleaner up to 2023.03.14 and classified as problematic. Affected by this issue is some unknown functionality of the component Log File Endpoint. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-262310 is the identifier assigned to this vulnerability."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in MailCleaner bis 2023.03.14 gefunden. Sie wurde als problematisch eingestuft. Davon betroffen ist unbekannter Code der Komponente Log File Endpoint. Durch Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross Site Scripting",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T06:22:40.854Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262310 | MailCleaner Log File Endpoint cross site scripting",
"tags": [
"vdb-entry"
],
"url": "https://vuldb.com/?id.262310"
},
{
"name": "VDB-262310 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262310"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T08:26:31.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner Log File Endpoint cross site scripting"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3194",
"datePublished": "2024-04-29T06:22:40.854Z",
"dateReserved": "2024-04-02T14:22:45.652Z",
"dateUpdated": "2024-08-01T20:05:07.997Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3193 (GCVE-0-2024-3193)
Vulnerability from cvelistv5 – Published: 2024-04-29 06:22 – Updated: 2024-08-01 20:05- CWE-78 - OS Command Injection
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3193",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-29T17:43:34.575455Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:32:33.010Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:07.809Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262309 | MailCleaner Admin Endpoints os command injection",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://vuldb.com/?id.262309"
},
{
"name": "VDB-262309 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262309"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"Admin Endpoints"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in MailCleaner up to 2023.03.14 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Admin Endpoints. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-262309 was assigned to this vulnerability."
},
{
"lang": "de",
"value": "In MailCleaner bis 2023.03.14 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Komponente Admin Endpoints. Durch die Manipulation mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 10,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T06:22:38.861Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262309 | MailCleaner Admin Endpoints os command injection",
"tags": [
"vdb-entry"
],
"url": "https://vuldb.com/?id.262309"
},
{
"name": "VDB-262309 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262309"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T08:26:30.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner Admin Endpoints os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3193",
"datePublished": "2024-04-29T06:22:38.861Z",
"dateReserved": "2024-04-02T14:22:43.107Z",
"dateUpdated": "2024-08-01T20:05:07.809Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3192 (GCVE-0-2024-3192)
Vulnerability from cvelistv5 – Published: 2024-04-29 06:22 – Updated: 2024-08-01 20:05- CWE-79 - Cross Site Scripting
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3192",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-29T16:18:13.981404Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:32:27.728Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:08.206Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262308 | MailCleaner Admin Interface cross site scripting",
"tags": [
"vdb-entry",
"technical-description",
"x_transferred"
],
"url": "https://vuldb.com/?id.262308"
},
{
"name": "VDB-262308 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262308"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"modules": [
"Admin Interface"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in MailCleaner up to 2023.03.14. Affected is an unknown function of the component Admin Interface. The manipulation as part of Mail Message leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262308."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in MailCleaner bis 2023.03.14 gefunden. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Komponente Admin Interface. Mit der Manipulation durch Mail Message kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross Site Scripting",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T09:45:06.885Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262308 | MailCleaner Admin Interface cross site scripting",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.262308"
},
{
"name": "VDB-262308 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262308"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T11:45:07.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner Admin Interface cross site scripting"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3192",
"datePublished": "2024-04-29T06:22:37.114Z",
"dateReserved": "2024-04-02T14:22:39.907Z",
"dateUpdated": "2024-08-01T20:05:08.206Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-3191 (GCVE-0-2024-3191)
Vulnerability from cvelistv5 – Published: 2024-04-29 06:21 – Updated: 2024-08-27 17:34- CWE-78 - OS Command Injection
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | MailCleaner |
Affected:
2023.03.0
Affected: 2023.03.1 Affected: 2023.03.2 Affected: 2023.03.3 Affected: 2023.03.4 Affected: 2023.03.5 Affected: 2023.03.6 Affected: 2023.03.7 Affected: 2023.03.8 Affected: 2023.03.9 Affected: 2023.03.10 Affected: 2023.03.11 Affected: 2023.03.12 Affected: 2023.03.13 Affected: 2023.03.14 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:05:07.514Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VDB-262307 | MailCleaner Email os command injection",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "https://vuldb.com/?id.262307"
},
{
"name": "VDB-262307 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required",
"x_transferred"
],
"url": "https://vuldb.com/?ctiid.262307"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit",
"x_transferred"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:mailcleaner:mailcleaner:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mailcleaner",
"vendor": "mailcleaner",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-3191",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-30T13:41:22.311410Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-27T17:34:56.094Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"Email Handler"
],
"product": "MailCleaner",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2023.03.0"
},
{
"status": "affected",
"version": "2023.03.1"
},
{
"status": "affected",
"version": "2023.03.2"
},
{
"status": "affected",
"version": "2023.03.3"
},
{
"status": "affected",
"version": "2023.03.4"
},
{
"status": "affected",
"version": "2023.03.5"
},
{
"status": "affected",
"version": "2023.03.6"
},
{
"status": "affected",
"version": "2023.03.7"
},
{
"status": "affected",
"version": "2023.03.8"
},
{
"status": "affected",
"version": "2023.03.9"
},
{
"status": "affected",
"version": "2023.03.10"
},
{
"status": "affected",
"version": "2023.03.11"
},
{
"status": "affected",
"version": "2023.03.12"
},
{
"status": "affected",
"version": "2023.03.13"
},
{
"status": "affected",
"version": "2023.03.14"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Imfeld"
},
{
"lang": "en",
"type": "finder",
"value": "Pascal Zenker"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in MailCleaner up to 2023.03.14. This issue affects some unknown processing of the component Email Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262307."
},
{
"lang": "de",
"value": "Eine Schwachstelle wurde in MailCleaner bis 2023.03.14 entdeckt. Sie wurde als kritisch eingestuft. Dies betrifft einen unbekannten Teil der Komponente Email Handler. Dank Manipulation mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 10,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-29T06:21:47.288Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-262307 | MailCleaner Email os command injection",
"tags": [
"vdb-entry"
],
"url": "https://vuldb.com/?id.262307"
},
{
"name": "VDB-262307 | CTI Indicators (IOB, IOC, TTP)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.262307"
},
{
"tags": [
"related"
],
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/"
},
{
"tags": [
"exploit"
],
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf"
},
{
"tags": [
"issue-tracking",
"patch"
],
"url": "https://github.com/MailCleaner/MailCleaner/pull/601"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-04-23T00:00:00.000Z",
"value": "Countermeasure disclosed"
},
{
"lang": "en",
"time": "2024-04-29T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-04-29T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-04-29T08:26:26.000Z",
"value": "VulDB entry last update"
}
],
"title": "MailCleaner Email os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-3191",
"datePublished": "2024-04-29T06:21:47.288Z",
"dateReserved": "2024-04-02T14:22:37.552Z",
"dateUpdated": "2024-08-27T17:34:56.094Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-1010246 (GCVE-0-2019-1010246)
Vulnerability from cvelistv5 – Published: 2019-07-18 18:04 – Updated: 2024-08-05 03:07- Unauthenticated MySQL database password information disclosure
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MailCleaner | MailCleaner |
Affected:
before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 [fixed: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9]
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:07:18.487Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/commit/c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "MailCleaner",
"vendor": "MailCleaner",
"versions": [
{
"status": "affected",
"version": "before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 [fixed: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9]"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "MailCleaner before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 is affected by: Unauthenticated MySQL database password information disclosure. The impact is: MySQL database content disclosure (e.g. username, password). The component is: The API call in the function allowAction() in NewslettersController.php. The attack vector is: HTTP Get request. The fixed version is: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Unauthenticated MySQL database password information disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-07-18T18:04:34",
"orgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8",
"shortName": "dwf"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/MailCleaner/MailCleaner/commit/c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"ID": "CVE-2019-1010246",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "MailCleaner",
"version": {
"version_data": [
{
"version_value": "before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 [fixed: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9]"
}
]
}
}
]
},
"vendor_name": "MailCleaner"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "MailCleaner before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 is affected by: Unauthenticated MySQL database password information disclosure. The impact is: MySQL database content disclosure (e.g. username, password). The component is: The API call in the function allowAction() in NewslettersController.php. The attack vector is: HTTP Get request. The fixed version is: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Unauthenticated MySQL database password information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/MailCleaner/MailCleaner/commit/c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9",
"refsource": "MISC",
"url": "https://github.com/MailCleaner/MailCleaner/commit/c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8",
"assignerShortName": "dwf",
"cveId": "CVE-2019-1010246",
"datePublished": "2019-07-18T18:04:34",
"dateReserved": "2019-03-20T00:00:00",
"dateUpdated": "2024-08-05T03:07:18.487Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-20323 (GCVE-0-2018-20323)
Vulnerability from cvelistv5 – Published: 2019-03-17 21:38 – Updated: 2024-08-05 11:58- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T11:58:19.133Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/151056/Mailcleaner-Remote-Code-Execution.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "www/soap/application/MCSoap/Logs.php in MailCleaner Community Edition 2018.08 allows remote attackers to execute arbitrary OS commands."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-03-17T21:38:18",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/151056/Mailcleaner-Remote-Code-Execution.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20323",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "www/soap/application/MCSoap/Logs.php in MailCleaner Community Edition 2018.08 allows remote attackers to execute arbitrary OS commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.com/files/151056/Mailcleaner-Remote-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/151056/Mailcleaner-Remote-Code-Execution.html"
},
{
"name": "https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/",
"refsource": "MISC",
"url": "https://pentest.blog/advisory-mailcleaner-community-edition-remote-code-execution/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-20323",
"datePublished": "2019-03-17T21:38:18",
"dateReserved": "2018-12-20T00:00:00",
"dateUpdated": "2024-08-05T11:58:19.133Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-18635 (GCVE-0-2018-18635)
Vulnerability from cvelistv5 – Published: 2018-10-24 21:00 – Updated: 2024-08-05 11:15- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T11:15:59.757Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/issues/53"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/MailCleaner/MailCleaner/commit/5f90a52785672fc688c1f85e472e84b8a0d008d8"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-10-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "www/guis/admin/application/controllers/UserController.php in the administration login interface in MailCleaner CE 2018.08 and 2018.09 allows XSS via the admin/login/user/message/ PATH_INFO."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-24T21:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/MailCleaner/MailCleaner/issues/53"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/MailCleaner/MailCleaner/commit/5f90a52785672fc688c1f85e472e84b8a0d008d8"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-18635",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "www/guis/admin/application/controllers/UserController.php in the administration login interface in MailCleaner CE 2018.08 and 2018.09 allows XSS via the admin/login/user/message/ PATH_INFO."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/MailCleaner/MailCleaner/issues/53",
"refsource": "MISC",
"url": "https://github.com/MailCleaner/MailCleaner/issues/53"
},
{
"name": "https://github.com/MailCleaner/MailCleaner/commit/5f90a52785672fc688c1f85e472e84b8a0d008d8",
"refsource": "MISC",
"url": "https://github.com/MailCleaner/MailCleaner/commit/5f90a52785672fc688c1f85e472e84b8a0d008d8"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-18635",
"datePublished": "2018-10-24T21:00:00",
"dateReserved": "2018-10-24T00:00:00",
"dateUpdated": "2024-08-05T11:15:59.757Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}