CVE-2024-34470

HIGH NUCLEI

HSC Mailinspector <5.2.18 - Path Traversal

Title source: llm
STIX 2.1

Description

An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the server.

Exploits (5)

nomisec WORKING POC 5 stars
by Mr-r00t11 · poc
https://github.com/Mr-r00t11/CVE-2024-34470
nomisec SCANNER 5 stars
by bigb0x · poc
https://github.com/bigb0x/CVE-2024-34470
nomisec WORKING POC 3 stars
by th3gokul · poc
https://github.com/th3gokul/CVE-2024-34470
nomisec SCANNER 2 stars
by Cappricio-Securities · poc
https://github.com/Cappricio-Securities/CVE-2024-34470
nomisec WORKING POC 1 stars
by osvaldotenorio · poc
https://github.com/osvaldotenorio/CVE-2024-34470

Nuclei Templates (1)

HSC Mailinspector 5.2.17-3 through 5.2.18 - Local File Inclusion
HIGHVERIFIEDby topscoder
FOFA: mailinspector/public

Scores

CVSS v3 8.6
EPSS 0.9364
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-29
Status published
Products (1)
hsclabs/mailinspector 5.2.17-3 - 5.2.19
Published May 06, 2024
Tracked Since Feb 18, 2026