An issue was discovered in mipjz 5.0.5. In the push method of app\tag\controller\ApiAdminTag.php the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in Server-side request forgery (SSRF) vulnerability that can read server files.
History

Tue, 29 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Mipjz Project
Mipjz Project mipjz
Weaknesses CWE-918
CPEs cpe:2.3:a:mipjz_project:mipjz:5.0.5:*:*:*:*:*:*:*
Vendors & Products Mipjz Project
Mipjz Project mipjz
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 25 Oct 2024 21:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in mipjz 5.0.5. In the push method of app\tag\controller\ApiAdminTag.php the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in Server-side request forgery (SSRF) vulnerability that can read server files.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-10-25T00:00:00

Updated: 2024-10-29T19:00:05.431Z

Reserved: 2024-10-08T00:00:00

Link: CVE-2024-48234

cve-icon Vulnrichment

Updated: 2024-10-29T18:59:58.733Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-25T22:15:02.453

Modified: 2024-10-29T19:35:19.743

Link: CVE-2024-48234

cve-icon Redhat

No data.