An issue was found in mipjz 5.0.5. In the mipPost method of \app\setting\controller\ApiAdminTool.php, the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in a Server-side request forgery (SSRF) vulnerability that can read server files.
History

Wed, 30 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Mipjz Project
Mipjz Project mipjz
Weaknesses CWE-918
CPEs cpe:2.3:a:mipjz_project:mipjz:5.0.5:*:*:*:*:*:*:*
Vendors & Products Mipjz Project
Mipjz Project mipjz
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 25 Oct 2024 20:45:00 +0000

Type Values Removed Values Added
Description An issue was found in mipjz 5.0.5. In the mipPost method of \app\setting\controller\ApiAdminTool.php, the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in a Server-side request forgery (SSRF) vulnerability that can read server files.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-10-25T00:00:00

Updated: 2024-10-30T19:10:24.432Z

Reserved: 2024-10-08T00:00:00

Link: CVE-2024-48232

cve-icon Vulnrichment

Updated: 2024-10-30T19:10:19.041Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-25T21:15:04.170

Modified: 2024-10-30T19:35:26.257

Link: CVE-2024-48232

cve-icon Redhat

No data.