Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jwrv-4xvm-wq5g

Опубликовано: 31 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.1
CVSS3: 6.1

Описание

The vulnerability exists in the EJBCA service, version 8.0 Enterprise. Not tested in higher versions. By modifying the ‘Host’ header in an HTTP request, it is possible to manipulate the generated links and thus redirect the client to a different base URL. In this way, an attacker could insert his own server for the client to send HTTP requests, provided he succeeds in exploiting it.

The vulnerability exists in the EJBCA service, version 8.0 Enterprise. Not tested in higher versions. By modifying the ‘Host’ header in an HTTP request, it is possible to manipulate the generated links and thus redirect the client to a different base URL. In this way, an attacker could insert his own server for the client to send HTTP requests, provided he succeeds in exploiting it.

EPSS

Процентиль: 38%
0.00167
Низкий

5.1 Medium

CVSS4

6.1 Medium

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 6.1
nvd
10 месяцев назад

The vulnerability exists in the EJBCA service, version 8.0 Enterprise. Not tested in higher versions. By modifying the ‘Host’ header in an HTTP request, it is possible to manipulate the generated links and thus redirect the client to a different base URL. In this way, an attacker could insert his own server for the client to send HTTP requests, provided he succeeds in exploiting it.

EPSS

Процентиль: 38%
0.00167
Низкий

5.1 Medium

CVSS4

6.1 Medium

CVSS3

Дефекты

CWE-74