First published: Thu Dec 31 2020(Updated: )
HGiga MailSherlock contains a vulnerability of SQL Injection. Attackers can inject and launch SQL commands in a URL parameter.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Hgiga Msr45 Isherlock-antispam | <4.5-133 | |
Hgiga Msr45 Isherlock-user | <4.5-120 | |
Hgiga Ssr45 Isherlock-antispam | <4.5-133 | |
Hgiga Ssr45 Isherlock-user | <4.5-120 |
Update MailSherlock MSR45/SSR45 Module to: iSherlock-user-4.5-120.i386.rpm iSherlock-antispam-4.5-133.i386.rpm
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35742 is classified as a medium severity vulnerability due to its potential for SQL injection attacks.
To fix CVE-2020-35742, update your Hgiga MailSherlock software to a version greater than 4.5-133 for antispam or greater than 4.5-120 for user.
CVE-2020-35742 can be exploited through SQL injection attacks by injecting malicious SQL commands via URL parameters.
CVE-2020-35742 affects Hgiga Msr45 and Ssr45 Isherlock-antispam versions up to 4.5-133 and user versions up to 4.5-120.
Yes, CVE-2020-35742 is relatively easy to exploit for attackers with knowledge of SQL injection techniques.