{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-4296","assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","state":"PUBLISHED","assignerShortName":"twcert","dateReserved":"2024-04-29T01:47:05.422Z","datePublished":"2024-04-29T02:08:23.300Z","dateUpdated":"2025-07-14T02:15:08.879Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["iSherlock-useradmin-4.5"],"product":"iSherlock 4.5","vendor":"HGiga","versions":[{"lessThan":"149","status":"affected","version":"earlier","versionType":"custom"}]},{"defaultStatus":"unaffected","modules":["iSherlock-useradmin-5.5"],"product":"iSherlock 5.5","vendor":"HGiga","versions":[{"lessThan":"149","status":"affected","version":"earlier","versionType":"custom"}]}],"datePublic":"2024-04-29T02:03:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The account management interface of HGiga iSherlock (including MailSherlock, SpamSherlock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability to download arbitrary system files."}],"value":"The account management interface of HGiga iSherlock (including MailSherlock, SpamSherlock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability to download arbitrary system files."}],"impacts":[{"capecId":"CAPEC-597","descriptions":[{"lang":"en","value":"CAPEC-597 Absolute Path Traversal"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert","dateUpdated":"2025-07-14T02:15:08.879Z"},"references":[{"tags":["third-party-advisory"],"url":"https://www.twcert.org.tw/tw/cp-132-7765-49906-1.html"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Update iSherlock-useradmin-4.5 to version 149 or later<br>\n\nUpdate&nbsp;iSherlock-useradmin-5.5\n\n\n\nto version 149 or later"}],"value":"Update iSherlock-useradmin-4.5 to version 149 or later\n\n\nUpdate iSherlock-useradmin-5.5\n\n\n\nto version 149 or later"}],"source":{"advisory":"TVN-202404007","discovery":"EXTERNAL"},"title":"HGiga iSherlock - Arbitrary File Download","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T20:33:53.173Z"},"title":"CVE Program Container","references":[{"tags":["third-party-advisory","x_transferred"],"url":"https://www.twcert.org.tw/tw/cp-132-7765-49906-1.html"}]},{"affected":[{"vendor":"hgiga","product":"isherlock","cpes":["cpe:2.3:a:hgiga:isherlock:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThan":"4.5-149","versionType":"custom"},{"version":"0","status":"affected","lessThan":"5.5-149","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-06T19:54:13.850537Z","id":"CVE-2024-4296","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-06T20:03:13.097Z"}}]}}