A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://vufind.org/wiki/security:cve-2024-25738 |
History
Thu, 22 Aug 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-918 | |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-22T19:20:30.427Z
Reserved:
Link: CVE-2024-25738
Vulnrichment
Updated: 2024-08-01T23:52:05.977Z
NVD
Status : Awaiting Analysis
Published: 2024-05-22T19:15:08.807
Modified: 2024-08-22T20:35:05.737
Link: CVE-2024-25738
Redhat
No data.