FKIE_CVE-2019-9882
Vulnerability from fkie_nvd - Published: 2019-06-03 18:29 - Updated: 2024-11-21 04:52
Severity ?
Summary
Multi modules of MailSherlock MSR35 and MSR45 lead to a CSRF vulnerability. It allows attacker to add malicious email sources into whitelist via user/save_list.php?ACSION=&type=email&category=white&locate=big5&cmd=add&new=hacker@socialengineering.com&new_memo=&add=%E6%96%B0%E5%A2%9E without any authorizes.
References
| URL | Tags | ||
|---|---|---|---|
| twcert@cert.org.tw | http://surl.twcert.org.tw/MtWeJ | Exploit, Third Party Advisory | |
| twcert@cert.org.tw | https://tvn.twcert.org.tw/taiwanvn/TVN-201904002 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://surl.twcert.org.tw/MtWeJ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tvn.twcert.org.tw/taiwanvn/TVN-201904002 | Exploit, Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hgiga | msr35_isherlock-base | * | |
| hgiga | msr35_isherlock-sysinfo | * | |
| hgiga | msr35_isherlock-user | * | |
| hgiga | msr35_isherlock-useradmin | * | |
| hgiga | msr45_isherlock-base | * | |
| hgiga | msr45_isherlock-sysinfo | * | |
| hgiga | msr45_isherlock-user | * | |
| hgiga | msr45_isherlock-useradmin | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hgiga:msr35_isherlock-base:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81551260-B53B-4483-BCDA-AB809229332F",
"versionEndExcluding": "1.5.328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hgiga:msr35_isherlock-sysinfo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C84F8EE8-BCFB-42AB-A5C0-00387A3924E1",
"versionEndExcluding": "1.5.196",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hgiga:msr35_isherlock-user:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2128B45-5C84-465F-8192-5F3D50FB3150",
"versionEndExcluding": "1.5.127",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hgiga:msr35_isherlock-useradmin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50A82BFA-3267-4EF8-963E-4C43BB59EC6C",
"versionEndExcluding": "1.5.239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hgiga:msr45_isherlock-base:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E89BBA97-54CF-409A-87C3-3D7811073950",
"versionEndExcluding": "4.5-206",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hgiga:msr45_isherlock-sysinfo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F146CEE7-D66B-45A4-BC83-9CDF937F0D75",
"versionEndExcluding": "4.5-109",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hgiga:msr45_isherlock-user:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FA7AA60-C9DE-4A6C-BB99-27E8E1E239F3",
"versionEndExcluding": "4.5-81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hgiga:msr45_isherlock-useradmin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1826C46-146C-423A-8AA7-E553FCB1F11D",
"versionEndExcluding": "4.5-106",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multi modules of MailSherlock MSR35 and MSR45 lead to a CSRF vulnerability. It allows attacker to add malicious email sources into whitelist via user/save_list.php?ACSION=\u0026type=email\u0026category=white\u0026locate=big5\u0026cmd=add\u0026new=hacker@socialengineering.com\u0026new_memo=\u0026add=%E6%96%B0%E5%A2%9E without any authorizes."
},
{
"lang": "es",
"value": "Los m\u00f3dulos m\u00faltiples de MailSherlock MSR35 y MSR45 conducen a una vulnerabilidad CSRF. Permite al atacante agregar fuentes de correo electr\u00f3nico maliciosas en la lista blanca sin ninguna autorizaci\u00f3n mediante user/save_list.php?ACSION=\u0026type=email\u0026category=white\u0026locate=big5\u0026cmd=add\u0026new=hacker@socialengineering.com\u0026new_memo=\u0026add=%E6%96%B0%E5%A2%9"
}
],
"id": "CVE-2019-9882",
"lastModified": "2024-11-21T04:52:30.160",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-06-03T18:29:06.077",
"references": [
{
"source": "twcert@cert.org.tw",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://surl.twcert.org.tw/MtWeJ"
},
{
"source": "twcert@cert.org.tw",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://tvn.twcert.org.tw/taiwanvn/TVN-201904002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://surl.twcert.org.tw/MtWeJ"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://tvn.twcert.org.tw/taiwanvn/TVN-201904002"
}
],
"sourceIdentifier": "twcert@cert.org.tw",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "twcert@cert.org.tw",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…