Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8fvc-gf7v-rjqg

Опубликовано: 13 авг. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 7.3

Описание

A vulnerability has been found in wanglongcn ltcms 1.0.20 and classified as critical. This vulnerability affects the function download of the file /api/test/download of the component API Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability has been found in wanglongcn ltcms 1.0.20 and classified as critical. This vulnerability affects the function download of the file /api/test/download of the component API Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 49%
0.00256
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 7.3
nvd
больше 1 года назад

A vulnerability has been found in wanglongcn ltcms 1.0.20 and classified as critical. This vulnerability affects the function download of the file /api/test/download of the component API Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 49%
0.00256
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-918