This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Unauthenticated Path Traversal in HSC Mailinspector. π **Consequences**: Attackers can read arbitrary files on the server, potentially exposing sensitive data like credentials or configs.β¦
π‘οΈ **CWE**: CWE-22 (Path Traversal). π **Flaw**: The `/public/loader.php` file fails to sanitize the `path` parameter. It doesn't verify if the requested file is within the webroot, allowing `../` traversal.
Q3Who is affected? (Versions/Components)
π’ **Vendor**: HSC Cybersecurity. π¦ **Product**: HC Mailinspector (Cloud Email Security). π **Affected Versions**: 5.2.17-3 through 5.2.18. β οΈ **Scope**: All versions up to 5.2.18 are vulnerable.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Action**: Read any file accessible by the web server process. π **Data**: OS files, config files, source code. π **Privileges**: No authentication required. Low barrier to entry for data theft.
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: LOW. πͺ **Auth**: None required (Unauthenticated). βοΈ **Config**: Standard web access is enough. π― **Ease**: Simple payload injection (`../`) makes it easy to exploit.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π₯ **Exploit**: YES. π **PoC**: Multiple public PoCs on GitHub (e.g., osvaldotenorio, bigb0x). π οΈ **Tools**: Bulk scanners and automated tools (CVEHunter) are available for mass exploitation.β¦
π **Check**: Send request to `/mailinspector/public/loader.php` with `path=../../../../etc/passwd`. π **Scan**: Use Python scripts from GitHub repos to scan single or bulk targets.β¦
π‘οΈ **Fix**: Upgrade to version > 5.2.18. π **Patch**: Official patch released by HSC Cybersecurity. β **Status**: Fixed in newer versions. π **Action**: Immediate update recommended.
Q9What if no patch? (Workaround)
π§ **Workaround**: If patching is delayed, restrict access to `/public/loader.php` via WAF or firewall rules. π« **Block**: Block external access to this specific endpoint.β¦