URL Restriction Bypass in GitHub repository plantuml/plantuml prior to V1.2022.5. An attacker can abuse this to bypass URL restrictions that are imposed by the different security profiles and achieve server side request forgery (SSRF). This allows accessing restricted internal resources/servers or sending requests to third party servers.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-24699 | URL Restriction Bypass in GitHub repository plantuml/plantuml prior to V1.2022.5. An attacker can abuse this to bypass URL restrictions that are imposed by the different security profiles and achieve server side request forgery (SSRF). This allows accessing restricted internal resources/servers or sending requests to third party servers. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: @huntrdev
Published:
Updated: 2024-08-03T00:03:06.044Z
Reserved: 2022-04-15T00:00:00.000Z
Link: CVE-2022-1379
No data.
Status : Modified
Published: 2022-05-14T10:15:07.927
Modified: 2024-11-21T06:40:36.590
Link: CVE-2022-1379
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD