{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-24841","assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","assignerShortName":"twcert","dateUpdated":"2025-02-19T15:55:17.853Z","dateReserved":"2023-01-31T00:00:00.000Z","datePublished":"2023-03-27T00:00:00.000Z"},"containers":{"cna":{"title":"HGiga MailSherlock - Command Injection","datePublic":"2023-02-24T00:00:00.000Z","providerMetadata":{"orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert","dateUpdated":"2023-03-27T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"HGiga MailSherlock query function for connection log has a vulnerability of insufficient filtering for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject and execute arbitrary system commands to perform arbitrary system operation or disrupt service."}],"affected":[{"vendor":"HGiga","product":"MailSherlock","versions":[{"version":"iSherlock-sysinfo-4.5","status":"affected","lessThanOrEqual":"iSherlock-sysinfo-4.5-132","versionType":"custom"}]}],"references":[{"url":"https://www.twcert.org.tw/tw/cp-132-6960-fc2fe-1.html"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"TVN-202302009","discovery":"EXTERNAL"},"solutions":[{"lang":"en","value":"Update MailSherlock package version to iSherlock-sysinfo-4.5-133.386"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T11:03:19.289Z"},"title":"CVE Program Container","references":[{"url":"https://www.twcert.org.tw/tw/cp-132-6960-fc2fe-1.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-19T15:54:46.098816Z","id":"CVE-2023-24841","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-19T15:55:17.853Z"}}]}}