The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability for Command Injection attacks, enabling execution of arbitrary system commands.
History

Fri, 14 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Hgiga
Hgiga isherlock
CPEs cpe:2.3:a:hgiga:isherlock:4.5:*:*:*:*:*:*:*
cpe:2.3:a:hgiga:isherlock:5.5:*:*:*:*:*:*:*
Vendors & Products Hgiga
Hgiga isherlock
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2025-02-13T17:53:32.370Z

Reserved: 2024-04-29T01:47:10.212Z

Link: CVE-2024-4299

cve-icon Vulnrichment

Updated: 2024-08-01T20:33:53.021Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-29T04:15:08.623

Modified: 2024-11-21T09:42:34.330

Link: CVE-2024-4299

cve-icon Redhat

No data.