Remote Code Execution Vulnerability in MailDev 2 through 2.1.0
CVE-2024-27448

9.1CRITICAL

Key Information:

Vendor

MailDev

Vendor
CVE Published:
5 April 2024

Badges

πŸ‘Ύ Exploit Exists🟣 EPSS 14%πŸ“° News Worthy

What is CVE-2024-27448?

The CVE-2024-27448 vulnerability in MailDev 2 through 2.1.0 allows remote code execution via a crafted Content-ID header for an e-mail attachment. The vulnerability can lead to lib/mailserver.js writing arbitrary code into the routes.js file. Exploiting this flaw could lead to unauthorized modification or deletion of critical files and even remote code execution. It is important for users of MailDev to update their software to the latest, patched version to mitigate this security risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

News Articles

Exposing a Major Security Flaw in MailDev: Inside the CVE-2024-27448 Vulnerability - Intrix Cyber Security

Delve into what makes the CVE-2024-27448 vulnerability a critical issue on MailDev for email testing and development.

References

EPSS Score

14% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by Intrix Cyber Security

  • Vulnerability published

  • Vulnerability Reserved

.