Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1925

Опубликовано: 08 янв. 2020
Источник: redhat
CVSS3: 6.8
EPSS Низкий

Описание

Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Data Virtualization 6teiid-olingoOut of support scope
Red Hat JBoss Data Virtualization 6teiid-olingo-odata4Out of support scope
Red Hat Fuse 7.9camel-olingo4FixedRHSA-2021:314011.08.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=1790309olingo-odata: Server side request forgery in AsyncResponseWrapperImpl

EPSS

Процентиль: 78%
0.01178
Низкий

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
около 6 лет назад

Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker.

CVSS3: 7.5
github
около 6 лет назад

Server-Side Request Forgery (SSRF) in Apache Olingo

EPSS

Процентиль: 78%
0.01178
Низкий

6.8 Medium

CVSS3