Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2024-32370 PoC — HSC Cybersecurity HC Mailinspector 安全漏洞

Source
Associated Vulnerability
Title:HSC Cybersecurity HC Mailinspector 安全漏洞 (CVE-2024-32370)
Description:An issue in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the id parameter in the mliSystemUsers.php component.
Readme
# CVE-2024-32370

## Vulnerability Description

### Issue
An issue in HSC Cybersecurity HSC Mailinspector version 5.2.17-3 has been identified, allowing a remote attacker to obtain sensitive information via a crafted payload to the `id` parameter in the `mliSystemUsers.php` component.

### Vulnerable Component
- **Component:** `mliSystemUsers.php`
- **Version:** 5.2.17-3 up to 5.2.18

### Vulnerable Parameter
- **Parameter:** `id`
- **Payload:** `flagChangeUserAccount=true&exe=load&id=501762441`

### Vulnerability Explanation
The vulnerability arises due to insufficient input validation and sanitization of the `id` parameter in the `mliSystemUsers.php` component. Attackers can exploit this flaw by sending a specially crafted payload to the `id` parameter, enabling them to obtain sensitive information from the system.

### Attack Scenario
A remote attacker can exploit this vulnerability by manipulating the `id` parameter in the payload. By sending a crafted request with a malicious `id` value, the attacker can trick the application into disclosing sensitive information, such as user account details or system configuration data.

### Impact
If successfully exploited, the vulnerability could lead to the unauthorized disclosure of sensitive information stored within the HSC Mailinspector system. This information disclosure may include user credentials, email content, or other confidential data, posing a significant risk to the confidentiality and integrity of the system.


![alt text](image.png)
File Snapshot

[4.0K] /data/pocs/08814c1a3a05faceff57154a5a293869b8a8bf11 ├── [131K] image.png └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →