Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-32371 PoC — HSC Cybersecurity HC Mailinspector 安全漏洞

Source
Associated Vulnerability
Title:HSC Cybersecurity HC Mailinspector 安全漏洞 (CVE-2024-32371)
Description:HSC Cybersecurity HC Mailinspector是HSC Cybersecurity公司的一个云电子邮件安全解决方案。 HSC Cybersecurity HC Mailinspector 5.2.17-3版本至5.2.18版本存在安全漏洞,该漏洞源于允许常规用户帐户通过将类型参数从 1 更改为 0 来升级其权限并获得管理访问权限。
Readme
# CVE-2024-32371 Description

## Description
A vulnerability identified as CVE-2024-32371 allows an attacker to elevate privileges by changing the `type` parameter from 1 to 0. This vulnerability enables an attacker with a regular user account to escalate their privileges and gain administrative access to the system.

Versions: Discovered in HSC Mailinspector 5.2.17-3 but applicable to all versions up to 5.2.18.

## Vulnerable Parameter
- **Parameter:** `type`
- **Affected Values:** Changing the value from 1 (normal user) to 0 (administrator)

## Vulnerability Explanation
The vulnerability arises due to insufficient access control checks on the `type` parameter. By manipulating the value of the `type` parameter in the request payload, an attacker can modify their user account's permissions from a regular user to an administrator.

## Attack Scenario
To exploit this vulnerability, an attacker can intercept or craft a request with the `type` parameter set to 0, indicating administrator privileges. By submitting this malicious request, the attacker can bypass the intended access control mechanisms and gain unauthorized access as an administrator.

## Impact
Successful exploitation of CVE-2024-32371 allows an attacker to perform administrative actions within the system, such as:
- Accessing sensitive data or functionalities restricted to administrators.
- Modifying system configurations or user privileges.
- Performing malicious activities with elevated privileges, potentially leading to further compromise or data breaches.


![alt text](image.png)

![alt text](image-1.png)
File Snapshot

[4.0K] /data/pocs/b657688c75f1e95640af18919136a73fa75383e4 ├── [152K] image-1.png ├── [118K] image.png └── [1.6K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.