First published: Sun Oct 27 2024(Updated: )
ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig for retrieving the configuration. This is related to kmail-account-wizard.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KMail | <6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50624 is classified as a medium severity vulnerability due to its potential for man-in-the-middle attacks on cleartext HTTP connections.
To fix CVE-2024-50624, users should upgrade to KDE Kmail version 6.2.0 or later to ensure secure configurations.
CVE-2024-50624 affects KDE Kmail versions prior to 6.2.0.
CVE-2024-50624 enables man-in-the-middle attacks by allowing attackers to control the retrieval of mail server configuration.
Yes, the use of cleartext HTTP in CVE-2024-50624 poses a significant security risk as it can be intercepted by attackers.