CVE-2024-50624

ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig for retrieving the configuration. This is related to kmail-account-wizard.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
ADJACENT_NETWORK
HIGH
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
mitreCNA
---
---
CISA-ADPADP
5.9 MEDIUM
ADJACENT_NETWORK
HIGH
NONE
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
CVEADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
Debian logo
Debian Releases
Debian Product
Codename
kmail-account-wizard
bullseye
vulnerable
bullseye (security)
4:20.08.3-1+deb11u1
fixed
bookworm
4:22.12.3-1+deb12u1
fixed
trixie
4:24.12.3-1
fixed
forky
4:24.12.3-2
fixed
sid
4:24.12.3-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
kmail
plucky
not-affected
oracular
ignored
noble
not-affected
jammy
not-affected
focal
not-affected
bionic
not-affected
kmail-account-wizard
plucky
not-affected
noble
Fixed 4:23.08.5-0ubuntu3+esm1
released
jammy
Fixed 4:21.12.3-0ubuntu1+esm1
released
focal
Fixed 4:19.12.3-0ubuntu1+esm1
released
bionic
Fixed 4:17.12.3-0ubuntu1+esm1
released
kdepim
plucky
dne
noble
dne
jammy
dne
xenial
Fixed 4:15.12.3-0ubuntu1.1+esm1
released
trusty
not-affected