{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-3196","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-04-02T14:22:51.446Z","datePublished":"2024-04-29T06:22:44.534Z","dateUpdated":"2024-08-01T20:05:07.551Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-04-29T09:46:39.153Z"},"title":"MailCleaner SOAP Service dumpConfiguration os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"CWE-78 OS Command Injection"}]}],"affected":[{"vendor":"n/a","product":"MailCleaner","versions":[{"version":"2023.03.0","status":"affected"},{"version":"2023.03.1","status":"affected"},{"version":"2023.03.2","status":"affected"},{"version":"2023.03.3","status":"affected"},{"version":"2023.03.4","status":"affected"},{"version":"2023.03.5","status":"affected"},{"version":"2023.03.6","status":"affected"},{"version":"2023.03.7","status":"affected"},{"version":"2023.03.8","status":"affected"},{"version":"2023.03.9","status":"affected"},{"version":"2023.03.10","status":"affected"},{"version":"2023.03.11","status":"affected"},{"version":"2023.03.12","status":"affected"},{"version":"2023.03.13","status":"affected"},{"version":"2023.03.14","status":"affected"}],"modules":["SOAP Service"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in MailCleaner up to 2023.03.14. It has been declared as critical. This vulnerability affects the function getStats/Services_silentDump/Services_stopStartMTA/Config_saveDateTime/Config_hostid/Logs_StartGetStat/dumpConfiguration of the component SOAP Service. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262312."},{"lang":"de","value":"In MailCleaner bis 2023.03.14 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Betroffen ist die Funktion getStats/Services_silentDump/Services_stopStartMTA/Config_saveDateTime/Config_hostid/Logs_StartGetStat/dumpConfiguration der Komponente SOAP Service. Mittels Manipulieren mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur öffentlichen Verfügung. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.7,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.7,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:L/AC:L/Au:M/C:C/I:C/A:C"}}],"timeline":[{"time":"2024-04-23T00:00:00.000Z","lang":"en","value":"Countermeasure disclosed"},{"time":"2024-04-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-04-29T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-04-29T11:45:46.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Michael Imfeld","type":"finder"},{"lang":"en","value":"Pascal Zenker","type":"finder"}],"references":[{"url":"https://vuldb.com/?id.262312","name":"VDB-262312 | MailCleaner SOAP Service dumpConfiguration os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.262312","name":"VDB-262312 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://modzero.com/en/advisories/mz-24-01-mailcleaner/","tags":["related"]},{"url":"https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf","tags":["exploit"]},{"url":"https://github.com/MailCleaner/MailCleaner/pull/601","tags":["issue-tracking","patch"]}]},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-3196","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-05-20T20:51:47.070761Z"}}}],"affected":[{"cpes":["cpe:2.3:a:mailcleaner:mailcleaner:*:*:*:*:*:*:*:*"],"vendor":"mailcleaner","product":"mailcleaner","versions":[{"status":"affected","version":"2023.03.0","versionType":"custom","lessThanOrEqual":"2023.03.14"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:30:58.900Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T20:05:07.551Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.262312","name":"VDB-262312 | MailCleaner SOAP Service dumpConfiguration os command injection","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.262312","name":"VDB-262312 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://modzero.com/en/advisories/mz-24-01-mailcleaner/","tags":["related","x_transferred"]},{"url":"https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf","tags":["exploit","x_transferred"]},{"url":"https://github.com/MailCleaner/MailCleaner/pull/601","tags":["issue-tracking","patch","x_transferred"]}]}]}}