{"api_version":"1","generated_at":"2026-04-26T02:39:09+00:00","cve":"CVE-2022-42136","urls":{"html":"https://cve.report/CVE-2022-42136","api":"https://cve.report/api/cve/CVE-2022-42136.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-42136","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-42136"},"summary":{"title":"CVE-2022-42136","description":"Authenticated mail users, under specific circumstances, could add files with unsanitized content in public folders where the IIS user had permission to access. That action, could lead an attacker to store arbitrary code on that files and execute RCE commands.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-01-13 21:15:00","updated_at":"2023-01-23 18:27:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://www.mailenable.com/kb/content/article.asp?ID=ME020737","name":"https://www.mailenable.com/kb/content/article.asp?ID=ME020737","refsource":"MISC","tags":[],"title":"MailEnable Vulnerabilities in Webmail for version 10.41, 9.84, 8.64 and earlier","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://pastebin.com/ahLNMf5n","name":"https://pastebin.com/ahLNMf5n","refsource":"MISC","tags":[],"title":"Vulnerabilities on MailEnable - Pastebin.com","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-42136","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42136","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"42136","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mailenable","cpe5":"mailenable","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"42136","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mailenable","cpe5":"mailenable","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise_premium","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"42136","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mailenable","cpe5":"mailenable","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"professional","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"42136","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mailenable","cpe5":"mailenable","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"standard","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-42136","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Authenticated mail users, under specific circumstances, could add files with unsanitized content in public folders where the IIS user had permission to access. That action, could lead an attacker to store arbitrary code on that files and execute RCE commands."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://www.mailenable.com/kb/content/article.asp?ID=ME020737","url":"https://www.mailenable.com/kb/content/article.asp?ID=ME020737"},{"refsource":"MISC","name":"https://pastebin.com/ahLNMf5n","url":"https://pastebin.com/ahLNMf5n"}]}},"nvd":{"publishedDate":"2023-01-13 21:15:00","lastModifiedDate":"2023-01-23 18:27:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"8.66","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"9.0","versionEndExcluding":"9.85","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"10.00","versionEndExcluding":"10.42","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise_premium:*:*:*","versionEndExcluding":"8.66","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise_premium:*:*:*","versionStartIncluding":"9.0","versionEndExcluding":"9.85","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:enterprise_premium:*:*:*","versionStartIncluding":"10.00","versionEndExcluding":"10.42","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:professional:*:*:*","versionStartIncluding":"9.0","versionEndExcluding":"9.85","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:professional:*:*:*","versionStartIncluding":"10.00","versionEndExcluding":"10.42","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:professional:*:*:*","versionEndExcluding":"8.66","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*","versionStartIncluding":"10.00","versionEndExcluding":"10.42","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*","versionEndExcluding":"8.66","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mailenable:mailenable:*:*:*:*:standard:*:*:*","versionStartIncluding":"9.0","versionEndExcluding":"9.85","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}