fkie_cve-2022-41675
Vulnerability from fkie_nvd
Published
2022-11-29 04:15
Modified
2024-11-21 07:23
Severity ?
Summary
A remote attacker with general user privilege can inject malicious code in the form content of Raiden MAILD Mail Server website. Other users export form content as CSV file can trigger arbitrary code execution and allow the attacker to perform arbitrary system operation or disrupt service on the user side.
References
▶ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-6738-b78f4-1.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.twcert.org.tw/tw/cp-132-6738-b78f4-1.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
raidenmaild | raidenmaild | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:raidenmaild:raidenmaild:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FC06351-BF11-4B17-91D3-32D0041D5851", "versionEndExcluding": "4.7.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote attacker with general user privilege can inject malicious code in the form content of Raiden MAILD Mail Server website. Other users export form content as CSV file can trigger arbitrary code execution and allow the attacker to perform arbitrary system operation or disrupt service on the user side." }, { "lang": "es", "value": "Un atacante remoto con privilegios de usuario general puede inyectar c\u00f3digo malicioso en el contenido del formulario del sitio web de Raiden MAILD Mail Server. Otros usuarios exportan el contenido del formulario como archivo CSV puede desencadenar la ejecuci\u00f3n de c\u00f3digo arbitrario y permitir que el atacante realice operaciones arbitrarias en el sistema o interrumpa el servicio del lado del usuario." } ], "id": "CVE-2022-41675", "lastModified": "2024-11-21T07:23:37.140", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Primary" } ] }, "published": "2022-11-29T04:15:10.633", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-6738-b78f4-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-6738-b78f4-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1236" } ], "source": "twcert@cert.org.tw", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-1236" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…