The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherlock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability to download arbitrary system files.
References
| Link | Resource |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-7767-ce3b4-1.html | Third Party Advisory |
| https://www.twcert.org.tw/tw/cp-132-7767-ce3b4-1.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Jan 2026, 14:42
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Hgiga
Hgiga isherlock |
|
| References | () https://www.twcert.org.tw/tw/cp-132-7767-ce3b4-1.html - Third Party Advisory | |
| CPE | cpe:2.3:a:hgiga:isherlock:*:*:*:*:*:*:*:* |
21 Nov 2024, 09:42
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.twcert.org.tw/tw/cp-132-7767-ce3b4-1.html - | |
| Summary |
|
29 Apr 2024, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-04-29 03:15
Updated : 2026-01-26 14:42
NVD link : CVE-2024-4297
Mitre link : CVE-2024-4297
CVE.ORG link : CVE-2024-4297
JSON object : View
Products Affected
hgiga
- isherlock
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
