CVE-2024-34472

An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An authenticated blind SQL injection vulnerability exists in the mliRealtimeEmails.php file. The ordemGrid parameter in a POST request to /mailinspector/mliRealtimeEmails.php does not properly sanitize input, allowing an authenticated attacker to execute arbitrary SQL commands, leading to the potential disclosure of the entire application database.
References
Link Resource
https://github.com/osvaldotenorio/CVE-2024-34472 Exploit Third Party Advisory
https://github.com/osvaldotenorio/CVE-2024-34472 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:hsclabs:mailinspector:*:*:*:*:*:*:*:*

History

17 Jun 2025, 16:22

Type Values Removed Values Added
CPE cpe:2.3:a:hsclabs:mailinspector:*:*:*:*:*:*:*:*
References () https://github.com/osvaldotenorio/CVE-2024-34472 - () https://github.com/osvaldotenorio/CVE-2024-34472 - Exploit, Third Party Advisory
First Time Hsclabs
Hsclabs mailinspector

Information

Published : 2024-05-06 15:15

Updated : 2025-06-17 16:22


NVD link : CVE-2024-34472

Mitre link : CVE-2024-34472

CVE.ORG link : CVE-2024-34472


JSON object : View

Products Affected

hsclabs

  • mailinspector
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')