Логотип exploitDog
bind:CVE-2024-48232
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-48232

Количество 2

Количество 2

nvd логотип

CVE-2024-48232

больше 1 года назад

An issue was found in mipjz 5.0.5. In the mipPost method of \app\setting\controller\ApiAdminTool.php, the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in a Server-side request forgery (SSRF) vulnerability that can read server files.

CVSS3: 4.9
EPSS: Низкий
github логотип

GHSA-7m83-4f94-8qqr

больше 1 года назад

An issue was found in mipjz 5.0.5. In the mipPost method of \app\setting\controller\ApiAdminTool.php, the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in a Server-side request forgery (SSRF) vulnerability that can read server files.

CVSS3: 4.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-48232

An issue was found in mipjz 5.0.5. In the mipPost method of \app\setting\controller\ApiAdminTool.php, the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in a Server-side request forgery (SSRF) vulnerability that can read server files.

CVSS3: 4.9
0%
Низкий
больше 1 года назад
github логотип
GHSA-7m83-4f94-8qqr

An issue was found in mipjz 5.0.5. In the mipPost method of \app\setting\controller\ApiAdminTool.php, the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in a Server-side request forgery (SSRF) vulnerability that can read server files.

CVSS3: 4.9
0%
Низкий
больше 1 года назад

Уязвимостей на страницу