Description
External server-side request vulnerability in MESbook 20221021.03 version, which could allow a remote, unauthenticated attacker to exploit the endpoint "/api/Proxy/Post?userName=&password=&uri=<FILE|INTERNAL URL|IP/HOST" or "/api/Proxy/Get?userName=&password=&uri=<ARCHIVO|URL INTERNA|IP/HOST" to read the source code of web files, read internal files or access network resources.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47527 | External server-side request vulnerability in MESbook 20221021.03 version, which could allow a remote, unauthenticated attacker to exploit the endpoint "/api/Proxy/Post?userName=&password=&uri=<FILE|INTERNAL URL|IP/HOST" or "/api/Proxy/Get?userName=&password=&uri=<ARCHIVO|URL INTERNA|IP/HOST" to read the source code of web files, read internal files or access network resources. |
References
History
Wed, 22 Oct 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mesbook:mesbook:20221021.03:*:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-08-01T21:41:03.308Z
Reserved: 2024-07-01T09:36:50.138Z
Link: CVE-2024-6424
Updated: 2024-08-01T21:41:03.308Z
Status : Analyzed
Published: 2024-07-01T13:15:06.690
Modified: 2025-10-22T20:34:00.133
Link: CVE-2024-6424
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:14:30Z
Weaknesses
EUVD