Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0315 | Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker. |
Github GHSA |
GHSA-v4qh-6367-4cx2 | Server-Side Request Forgery (SSRF) in Apache Olingo |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T06:54:00.059Z
Reserved: 2019-12-02T00:00:00
Link: CVE-2020-1925
No data.
Status : Modified
Published: 2020-01-09T19:15:10.807
Modified: 2024-11-21T05:11:37.143
Link: CVE-2020-1925
OpenCVE Enrichment
No data.
EUVD
Github GHSA