SQL Injection exists in MailSherlock before 1.5.235 for OAKlouds allows an unauthenticated user to extract the subjects of the emails of other users within the enterprise via the select_mid parameter in an letgo.cgi request.
References
Link | Resource |
---|---|
https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?lang=en-US&id=28 | Third Party Advisory |
https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?id=73 | Third Party Advisory |
Configurations
Information
Published : 2019-02-11 12:29
Updated : 2019-10-09 16:36
NVD link : CVE-2018-17542
Mitre link : CVE-2018-17542
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
hgiga
- oaklouds_mailsherlock