AI description
CVE-2024-34470 is a path traversal vulnerability found in HSC Mailinspector versions 5.2.17-3 through 5.2.18. The vulnerability exists in the `/public/loader.php` file. The `path` parameter in this file does not properly filter whether the passed file and directory are part of the webroot. This improper filtering allows an unauthenticated attacker to read arbitrary files on the server. By exploiting this vulnerability, attackers could access sensitive information, such as configuration files and credentials, potentially leading to further unauthorized access or attacks. To mitigate this vulnerability, users are advised to upgrade to HSC Mailinspector version 5.2.19 or later.
- Description
- An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the server.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 8.6
- Impact score
- 4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
- Severity
- HIGH
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-29
- Hype score
- Not currently trending
🚨CVE-2024-34470: Path Traversal Vulnerability in HSC MailInspector PoC: https://t.co/MN79KhvzOr FOFA: title=="..:: HSC MailInspector ::.." Video Credit: https://t.co/fzMNST9dTU https://t.co/xIAU8ubCxJ
@DarkWebInformer
11 Jul 2025
3721 Impressions
6 Retweets
23 Likes
9 Bookmarks
0 Replies
0 Quotes
CVE-2024-34470: Path Traversal vulnerability in HSC Mailinspector Credit: https://t.co/0mVeDfO7fQ https://t.co/w2bLrQoh9J
@DarkWebInformer
13 May 2025
8581 Impressions
19 Retweets
133 Likes
61 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hsclabs:mailinspector:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E2047F2C-68DF-40B9-913A-BF837D597293",
"versionEndExcluding": "5.2.19",
"versionStartIncluding": "5.2.17-3"
}
],
"operator": "OR"
}
]
}
]