FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to version 1.5.10, a server-side-request-forgery (SSRF) vulnerability allowed an unauthenticated user to trigger a GET request as the server to an arbitrary endpoint and URL scheme. This also allows remote access to files visible to the Apache user group. Other impacts vary based on server configuration. Version 1.5.10 contains a patch.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-50473 FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to version 1.5.10, a server-side-request-forgery (SSRF) vulnerability allowed an unauthenticated user to trigger a GET request as the server to an arbitrary endpoint and URL scheme. This also allows remote access to files visible to the Apache user group. Other impacts vary based on server configuration. Version 1.5.10 contains a patch.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-05T17:46:22.358Z

Reserved: 2023-10-19T20:34:00.946Z

Link: CVE-2023-46236

cve-icon Vulnrichment

Updated: 2024-08-02T20:37:40.228Z

cve-icon NVD

Status : Modified

Published: 2023-10-31T15:15:09.630

Modified: 2024-11-21T08:28:08.280

Link: CVE-2023-46236

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.