A vulnerability was found in MailCleaner up to 2023.03.14. It has been declared as critical. This vulnerability affects the function getStats/Services_silentDump/Services_stopStartMTA/Config_saveDateTime/Config_hostid/Logs_StartGetStat/dumpConfiguration of the component SOAP Service. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262312.
History

Fri, 21 Mar 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Mailcleaner
Mailcleaner mailcleaner
CPEs cpe:2.3:a:mailcleaner:mailcleaner:*:*:*:*:community:*:*:*
Vendors & Products Mailcleaner
Mailcleaner mailcleaner

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-04-29T06:22:44.534Z

Updated: 2024-08-01T20:05:07.551Z

Reserved: 2024-04-02T14:22:51.446Z

Link: CVE-2024-3196

cve-icon Vulnrichment

Updated: 2024-08-01T20:05:07.551Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-29T07:15:08.740

Modified: 2025-03-21T17:05:48.507

Link: CVE-2024-3196

cve-icon Redhat

No data.