CVE-2024-3193
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
29/04/2024
Last modified:
10/04/2025
Description
A vulnerability has been found in MailCleaner up to 2023.03.14 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Admin Endpoints. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-262309 was assigned to this vulnerability.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:mailcleaner:mailcleaner:*:*:*:*:community:*:*:* | 2023.03.14 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/MailCleaner/MailCleaner/pull/601
- https://modzero.com/en/advisories/mz-24-01-mailcleaner/
- https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf
- https://vuldb.com/?ctiid_262309=
- https://vuldb.com/?id_262309=
- https://github.com/MailCleaner/MailCleaner/pull/601
- https://modzero.com/en/advisories/mz-24-01-mailcleaner/
- https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf
- https://vuldb.com/?ctiid_262309=
- https://vuldb.com/?id_262309=