SparkShop <=1.1.7 is vulnerable to server-side request forgery (SSRF). This vulnerability allows attacks to scan ports on the Intranet or local network where the server resides, attack applications running on the Intranet or local network, or read metadata on the cloud server.
History

Wed, 30 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 28 Oct 2024 20:45:00 +0000

Type Values Removed Values Added
Description SparkShop <=1.1.7 is vulnerable to server-side request forgery (SSRF). This vulnerability allows attacks to scan ports on the Intranet or local network where the server resides, attack applications running on the Intranet or local network, or read metadata on the cloud server.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-10-28T00:00:00

Updated: 2024-10-30T16:59:38.111Z

Reserved: 2024-10-08T00:00:00

Link: CVE-2024-48107

cve-icon Vulnrichment

Updated: 2024-10-30T16:54:21.402Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-28T21:15:09.453

Modified: 2024-10-30T17:35:10.860

Link: CVE-2024-48107

cve-icon Redhat

No data.