First published: Mon Apr 29 2024(Updated: )
The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherlock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability to download arbitrary system files.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
HGiga iSherlock | ||
HGiga MailSherlock | ||
HGiga SpamSherlock | ||
HGiga AuditSherlock |
Update the iSherlock-sysinfo package to version 4.5-147 or later for iSherlock 4.5, and to version 5.5-147 or later for iSherlock 5.5.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4297 is considered a critical vulnerability due to its potential to allow remote attackers with administrative privileges to exploit the system.
To fix CVE-2024-4297, administrators should update the affected HGiga iSherlock, MailSherlock, SpamSherlock, and AuditSherlock software to the latest patched versions.
CVE-2024-4297 affects HGiga iSherlock, MailSherlock, SpamSherlock, and AuditSherlock software products.
CVE-2024-4297 can be exploited by sending specially crafted requests that include unfiltered special characters to the system configuration interface.
CVE-2024-4297 can be exploited by remote attackers who possess administrative privileges on the affected systems.