Vulnerability Description
SQL Injection exists in MailSherlock before 1.5.235 for OAKlouds allows an unauthenticated user to extract the subjects of the emails of other users within the enterprise via the select_mid parameter in an letgo.cgi request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hgiga | Oaklouds Mailsherlock | < 1.5.235 |
Related Weaknesses (CWE)
References
- https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?id=73Third Party Advisory
- https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?lang=Third Party Advisory
- https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?id=73Third Party Advisory
- https://twcert.org.tw/subpages/ServeThePublic/public_document_details.aspx?lang=Third Party Advisory
FAQ
What is CVE-2018-17542?
CVE-2018-17542 is a vulnerability with a CVSS score of 4.3 (MEDIUM). SQL Injection exists in MailSherlock before 1.5.235 for OAKlouds allows an unauthenticated user to extract the subjects of the emails of other users within the enterprise via the select_mid parameter ...
How severe is CVE-2018-17542?
CVE-2018-17542 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-17542?
Check the references section above for vendor advisories and patch information. Affected products include: Hgiga Oaklouds Mailsherlock.