Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rx7w-67vh-w8vg

Опубликовано: 26 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

An unauthenticated attacker may perform a blind server side request forgery (SSRF), due to a CLRF injection issue that can be leveraged to perform HTTP request smuggling. This SSRF leverages the WS-Addressing feature used during a WS-Eventing subscription SOAP operation. The attacker can control all the HTTP data sent in the SSRF connection, but the attacker can not receive any data back from this connection.

An unauthenticated attacker may perform a blind server side request forgery (SSRF), due to a CLRF injection issue that can be leveraged to perform HTTP request smuggling. This SSRF leverages the WS-Addressing feature used during a WS-Eventing subscription SOAP operation. The attacker can control all the HTTP data sent in the SSRF connection, but the attacker can not receive any data back from this connection.

EPSS

Процентиль: 55%
0.00324
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-93

Связанные уязвимости

CVSS3: 5.3
nvd
8 месяцев назад

An unauthenticated attacker may perform a blind server side request forgery (SSRF), due to a CLRF injection issue that can be leveraged to perform HTTP request smuggling. This SSRF leverages the WS-Addressing feature used during a WS-Eventing subscription SOAP operation. The attacker can control all the HTTP data sent in the SSRF connection, but the attacker can not receive any data back from this connection.

EPSS

Процентиль: 55%
0.00324
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-93