CVE-2024-50624

ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig for retrieving the configuration. This is related to kmail-account-wizard.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
ADJACENT_NETWORK
HIGH
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
mitreCNA
---
---
CISA-ADPADP
5.9 MEDIUM
ADJACENT_NETWORK
HIGH
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
CVEADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
Debian logo
Debian Releases
Debian Product
Codename
kmail-account-wizard
bullseye
vulnerable
bookworm
no-dsa
bullseye (security)
4:20.08.3-1+deb11u1
fixed
trixie
4:24.12.3-1
fixed
forky
4:24.12.3-2
fixed
sid
4:24.12.3-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
kmail
plucky
not-affected
oracular
ignored
noble
not-affected
jammy
not-affected
focal
not-affected
bionic
not-affected
kmail-account-wizard
plucky
not-affected
noble
needed
jammy
needed
focal
needed
bionic
needed
kdepim
plucky
dne
noble
dne
jammy
dne
xenial
needed
trusty
not-affected