A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.
History

Thu, 22 Aug 2024 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-22T19:20:30.427Z

Reserved:

Link: CVE-2024-25738

cve-icon Vulnrichment

Updated: 2024-08-01T23:52:05.977Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-22T19:15:08.807

Modified: 2024-08-22T20:35:05.737

Link: CVE-2024-25738

cve-icon Redhat

No data.