SQL Injection exists in MailSherlock before 1.5.235 for OAKlouds allows an unauthenticated user to extract the subjects of the emails of other users within the enterprise via the select_mid parameter in an letgo.cgi request.
References
Link | Resource |
---|---|
https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?id=73 | Third Party Advisory |
https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?lang=en-US&id=28 | Third Party Advisory |
https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?id=73 | Third Party Advisory |
https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?lang=en-US&id=28 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:54
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 4.3 |
References | () https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?id=73 - Third Party Advisory | |
References | () https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?lang=en-US&id=28 - Third Party Advisory |
Information
Published : 2019-02-11 20:29
Updated : 2024-11-21 03:54
NVD link : CVE-2018-17542
Mitre link : CVE-2018-17542
CVE.ORG link : CVE-2018-17542
JSON object : View
Products Affected
hgiga
- oaklouds_mailsherlock
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')