Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rx7c-6cwm-h95c

Опубликовано: 14 янв. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.3

Описание

A vulnerability, which was classified as critical, has been found in HaoKeKeJi YiQiNiu up to 3.1. Affected by this issue is the function http_post of the file /application/pay/controller/Api.php. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250652.

A vulnerability, which was classified as critical, has been found in HaoKeKeJi YiQiNiu up to 3.1. Affected by this issue is the function http_post of the file /application/pay/controller/Api.php. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250652.

EPSS

Процентиль: 43%
0.00207
Низкий

7.3 High

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 7.3
nvd
около 2 лет назад

A vulnerability, which was classified as critical, has been found in HaoKeKeJi YiQiNiu up to 3.1. Affected by this issue is the function http_post of the file /application/pay/controller/Api.php. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250652.

EPSS

Процентиль: 43%
0.00207
Низкий

7.3 High

CVSS3

Дефекты

CWE-918