The application was vulnerable to a Server-Side Request Forgery attacks, allowing the backend server to interact with unexpected endpoints, potentially including internal and local services, leading to attacks in other downstream systems.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-43593 | The application was vulnerable to a Server-Side Request Forgery attacks, allowing the backend server to interact with unexpected endpoints, potentially including internal and local services, leading to attacks in other downstream systems. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 06 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: TML
Published:
Updated: 2025-05-06T19:15:40.038Z
Reserved: 2022-09-08T00:00:00.000Z
Link: CVE-2022-40296
Updated: 2024-08-03T12:14:40.255Z
Status : Modified
Published: 2022-10-31T21:15:13.293
Modified: 2025-05-06T20:15:25.057
Link: CVE-2022-40296
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD