First published: Mon Apr 29 2024(Updated: )
The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability for Command Injection attacks, enabling execution of arbitrary system commands.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
HGiga iSherlock | ||
HGiga MailSherlock | ||
HGiga SpamSherock | ||
HGiga AuditSherlock |
Update the iSherlock-sysinfo package to version 4.5-147 or later for iSherlock 4.5, and to version 5.5-147 or later for iSherlock 5.5.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4299 is classified with a high severity due to its potential for command injection by attackers with administrative privileges.
To mitigate CVE-2024-4299, ensure that input validation is implemented to filter special characters in the affected system configuration interfaces.
CVE-2024-4299 affects HGiga iSherlock, MailSherlock, SpamSherock, and AuditSherlock software.
CVE-2024-4299 can be exploited by remote attackers who possess administrative privileges on the affected systems.
CVE-2024-4299 utilizes command injection as the primary attack vector, taking advantage of insufficient input sanitization.