CVE Vulnerabilities

CVE-2024-50624

Cleartext Transmission of Sensitive Information

Published: Oct 28, 2024 | Modified: May 31, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig for retrieving the configuration. This is related to kmail-account-wizard.

Weakness

The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

Affected Software

NameVendorStart VersionEnd Version
KdepimUbuntuesm-apps/xenial*
KdepimUbuntuupstream*
KmailUbuntufocal*
KmailUbuntuoracular*
Kmail-account-wizardUbuntuesm-apps/bionic*
Kmail-account-wizardUbuntuesm-apps/focal*
Kmail-account-wizardUbuntuesm-apps/jammy*
Kmail-account-wizardUbuntuesm-apps/noble*
Kmail-account-wizardUbuntujammy*
Kmail-account-wizardUbuntunoble*
Kmail-account-wizardUbuntuupstream*

Potential Mitigations

References