First published: Mon Feb 11 2019(Updated: )
SQL Injection exists in MailSherlock before 1.5.235 for OAKlouds allows an unauthenticated user to extract the subjects of the emails of other users within the enterprise via the select_mid parameter in an letgo.cgi request.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
HGiga OAKlouds | <1.5.235 |
Update the software to the latest version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17542 is considered a high severity vulnerability due to its ability to allow unauthorized access to sensitive email subjects.
To fix CVE-2018-17542, you should upgrade to MailSherlock version 1.5.235 or later.
Any users of MailSherlock versions prior to 1.5.235 are vulnerable to CVE-2018-17542.
CVE-2018-17542 allows an attacker to exploit SQL injection to extract email subjects from other users' accounts.
Yes, CVE-2018-17542 can be exploited by unauthenticated users remotely through crafted requests.