Description
An issue was discovered in mipjz 5.0.5. In the push method of app\tag\controller\ApiAdminTag.php the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in Server-side request forgery (SSRF) vulnerability that can read server files.
Published: 2024-10-25
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00168}

epss

{'score': 0.00195}


Tue, 29 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Mipjz Project
Mipjz Project mipjz
Weaknesses CWE-918
CPEs cpe:2.3:a:mipjz_project:mipjz:5.0.5:*:*:*:*:*:*:*
Vendors & Products Mipjz Project
Mipjz Project mipjz
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 25 Oct 2024 21:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in mipjz 5.0.5. In the push method of app\tag\controller\ApiAdminTag.php the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in Server-side request forgery (SSRF) vulnerability that can read server files.
References

Subscriptions

Mipjz Project Mipjz
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-29T19:00:05.431Z

Reserved: 2024-10-08T00:00:00.000Z

Link: CVE-2024-48234

cve-icon Vulnrichment

Updated: 2024-10-29T18:59:58.733Z

cve-icon NVD

Status : Deferred

Published: 2024-10-25T22:15:02.453

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-48234

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses