CVE-2022-42136

Authenticated mail users, under specific circumstances, could add files with unsanitized content in public folders where the IIS user had permission to access. That action, could lead an attacker to store arbitrary code on that files and execute RCE commands.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise_premium:*:*:*
cpe:2.3:a:mailenable:mailenable:*:*:*:*:professional:*:*:*
cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*
cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise_premium:*:*:*
cpe:2.3:a:mailenable:mailenable:*:*:*:*:professional:*:*:*
cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*
cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise_premium:*:*:*
cpe:2.3:a:mailenable:mailenable:*:*:*:*:professional:*:*:*
cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*

History

21 Nov 2024, 07:24

Type Values Removed Values Added
Summary
  • (es) Los usuarios de correo autenticados, en circunstancias específicas, podían agregar archivos con contenido no desinfectado en carpetas públicas a las que el usuario de IIS tenía permiso para acceder. Esa acción podría llevar a un atacante a almacenar código arbitrario en esos archivos y ejecutar comandos RCE.
References () https://pastebin.com/ahLNMf5n - Third Party Advisory () https://pastebin.com/ahLNMf5n - Third Party Advisory
References () https://www.mailenable.com/kb/content/article.asp?ID=ME020737 - Vendor Advisory () https://www.mailenable.com/kb/content/article.asp?ID=ME020737 - Vendor Advisory

Information

Published : 2023-01-13 21:15

Updated : 2024-11-21 07:24


NVD link : CVE-2022-42136

Mitre link : CVE-2022-42136

CVE.ORG link : CVE-2022-42136


JSON object : View

Products Affected

mailenable

  • mailenable
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')