The account management interface of HGiga iSherlock (including MailSherlock, SpamSherlock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability to download arbitrary system files.
References
| Link | Resource |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-7765-49906-1.html | Third Party Advisory |
| https://www.twcert.org.tw/tw/cp-132-7765-49906-1.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Jan 2026, 14:46
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.twcert.org.tw/tw/cp-132-7765-49906-1.html - Third Party Advisory | |
| CPE | cpe:2.3:a:hgiga:isherlock:*:*:*:*:*:*:*:* | |
| First Time |
Hgiga
Hgiga isherlock |
21 Nov 2024, 09:42
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://www.twcert.org.tw/tw/cp-132-7765-49906-1.html - |
29 Apr 2024, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-04-29 02:15
Updated : 2026-01-26 14:46
NVD link : CVE-2024-4296
Mitre link : CVE-2024-4296
CVE.ORG link : CVE-2024-4296
JSON object : View
Products Affected
hgiga
- isherlock
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
