Show plain JSON{"dataType": "CVE_RECORD", "cveMetadata": {"cveId": "CVE-2024-4299", "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "state": "PUBLISHED", "assignerShortName": "twcert", "dateReserved": "2024-04-29T01:47:10.212Z", "datePublished": "2024-04-29T03:15:18.038Z", "dateUpdated": "2025-07-14T02:21:35.775Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "modules": ["iSherlock-sysinfo-4.5"], "product": "iSherlock 4.5", "vendor": "HGiga", "versions": [{"lessThan": "147", "status": "affected", "version": "earlier", "versionType": "custom"}]}, {"defaultStatus": "unaffected", "modules": ["iSherlock-sysinfo-5.5"], "product": "iSherlock 5.5", "vendor": "HGiga", "versions": [{"lessThan": "147", "status": "affected", "version": "earlier", "versionType": "custom"}]}], "datePublic": "2024-04-29T03:12:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability for Command Injection attacks, enabling execution of arbitrary system commands."}], "value": "The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability for Command Injection attacks, enabling execution of arbitrary system commands."}], "impacts": [{"capecId": "CAPEC-88", "descriptions": [{"lang": "en", "value": "CAPEC-88 OS Command Injection"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert", "dateUpdated": "2025-07-14T02:21:35.775Z"}, "references": [{"tags": ["third-party-advisory"], "url": "https://www.twcert.org.tw/tw/cp-132-7771-36c50-1.html"}, {"tags": ["third-party-advisory"], "url": "https://www.chtsecurity.com/news/4559fabd-43d1-4324-a0b3-f459a05c2290"}, {"tags": ["third-party-advisory"], "url": "https://www.chtsecurity.com/news/f67fd9b5-cb7a-42e4-bcb7-cc1c73d1f851"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Update iSherlock-sysinfo-4.5 to version 147 or later<br>\n\nUpdate iSherlock-sysinfo-5.5 to version 147 or later\n\n<br>"}], "value": "Update iSherlock-sysinfo-4.5 to version 147 or later\n\n\nUpdate iSherlock-sysinfo-5.5 to version 147 or later"}], "source": {"advisory": "TVN-202404010", "discovery": "EXTERNAL"}, "title": "HGiga iSherlock - Command Injection", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2024-4299", "role": "CISA Coordinator", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2024-05-09T15:52:00.425739Z"}}}], "affected": [{"cpes": ["cpe:2.3:a:hgiga:isherlock:4.5:*:*:*:*:*:*:*"], "vendor": "hgiga", "product": "isherlock", "versions": [{"status": "affected", "version": "4.5-0", "lessThan": "4.5-147", "versionType": "custom"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:hgiga:isherlock:5.5:*:*:*:*:*:*:*"], "vendor": "hgiga", "product": "isherlock", "versions": [{"status": "affected", "version": "5.5-0", "lessThan": "5.5-147", "versionType": "custom"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T17:56:03.945Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T20:33:53.021Z"}, "title": "CVE Program Container", "references": [{"tags": ["third-party-advisory", "x_transferred"], "url": "https://www.twcert.org.tw/tw/cp-132-7771-36c50-1.html"}, {"url": "https://www.chtsecurity.com/news/4559fabd-43d1-4324-a0b3-f459a05c2290", "tags": ["x_transferred"]}, {"url": "https://www.chtsecurity.com/news/f67fd9b5-cb7a-42e4-bcb7-cc1c73d1f851", "tags": ["x_transferred"]}]}]}, "dataVersion": "5.1"}