Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-77xj-xc45-jf7m

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Because of no validation on a curl command in MagpieRSS 0.72 in the /extlib/Snoopy.class.inc file, when you send a request to the /scripts/magpie_debug.php or /scripts/magpie_simple.php page, it's possible to request any internal page if you use a https request.

Because of no validation on a curl command in MagpieRSS 0.72 in the /extlib/Snoopy.class.inc file, when you send a request to the /scripts/magpie_debug.php or /scripts/magpie_simple.php page, it's possible to request any internal page if you use a https request.

EPSS

Процентиль: 41%
0.00192
Низкий

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 5 лет назад

Because of no validation on a curl command in MagpieRSS 0.72 in the /extlib/Snoopy.class.inc file, when you send a request to the /scripts/magpie_debug.php or /scripts/magpie_simple.php page, it's possible to request any internal page if you use a https request.

CVSS3: 5.3
nvd
почти 5 лет назад

Because of no validation on a curl command in MagpieRSS 0.72 in the /extlib/Snoopy.class.inc file, when you send a request to the /scripts/magpie_debug.php or /scripts/magpie_simple.php page, it's possible to request any internal page if you use a https request.

EPSS

Процентиль: 41%
0.00192
Низкий

Дефекты

CWE-918