.. / CVE-2024-32399

Exploit for RaidenMAILD Mail Server v.4.9.4 - Path Traversal (CVE-2024-32399)

Description:

Directory Traversal vulnerability in RaidenMAILD Mail Server v.4.9.4 and before allows a remote attacker to obtain sensitive information via the /webeditor/ component.

Nuclei Template

View the template here CVE-2024-32399.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2024/CVE-2024-32399.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2024-32399
https://github.com/NN0b0dy/CVE-2024-32399/blob/main/README.md
https://owasp.org/www-community/attacks/Path_Traversal
https://github.com/nomi-sec/PoC-in-GitHub
https://github.com/NN0b0dy/CVE-2024-32399
https://github.com/NN0b0dy/c01/blob/main/01.pdf