Логотип exploitDog
bind:CVE-2024-25738
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-25738

Количество 2

Количество 2

nvd логотип

CVE-2024-25738

больше 1 года назад

A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-wx24-vqrg-m6m5

больше 1 года назад

VuFind Server-Side Request Forgery (SSRF) vulnerability

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-25738

A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.

CVSS3: 9.1
2%
Низкий
больше 1 года назад
github логотип
GHSA-wx24-vqrg-m6m5

VuFind Server-Side Request Forgery (SSRF) vulnerability

CVSS3: 9.1
2%
Низкий
больше 1 года назад

Уязвимостей на страницу