First published: Mon Apr 29 2024(Updated: )
The email search interface of HGiga iSherlock (including MailSherlock, SpamSherock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability for Command Injection attacks, enabling execution of arbitrary system commands.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
HGiga iSherlock |
Update the iSherlock-query package to version 4.5-188 or later for iSherlock 4.5, and to version 5.5-188 or later for iSherlock 5.5.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4298 is classified as a high-severity vulnerability due to its potential for command injection attacks.
To fix CVE-2024-4298, ensure that proper input validation and sanitization are implemented in the email search interface.
CVE-2024-4298 can be exploited for command injection attacks by remote attackers with administrative privileges.
CVE-2024-4298 affects HGiga iSherlock, including its components MailSherlock, SpamSherock, and AuditSherlock.
Only remote attackers with administrative privileges can exploit CVE-2024-4298 due to its access requirements.