Логотип exploitDog
bind:CVE-2024-48234
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-48234

Количество 2

Количество 2

nvd логотип

CVE-2024-48234

больше 1 года назад

An issue was discovered in mipjz 5.0.5. In the push method of app\tag\controller\ApiAdminTag.php the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in Server-side request forgery (SSRF) vulnerability that can read server files.

CVSS3: 4.9
EPSS: Низкий
github логотип

GHSA-j7x8-mfh6-8xfx

больше 1 года назад

An issue was discovered in mipjz 5.0.5. In the push method of app\tag\controller\ApiAdminTag.php the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in Server-side request forgery (SSRF) vulnerability that can read server files.

CVSS3: 4.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-48234

An issue was discovered in mipjz 5.0.5. In the push method of app\tag\controller\ApiAdminTag.php the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in Server-side request forgery (SSRF) vulnerability that can read server files.

CVSS3: 4.9
0%
Низкий
больше 1 года назад
github логотип
GHSA-j7x8-mfh6-8xfx

An issue was discovered in mipjz 5.0.5. In the push method of app\tag\controller\ApiAdminTag.php the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in Server-side request forgery (SSRF) vulnerability that can read server files.

CVSS3: 4.9
0%
Низкий
больше 1 года назад

Уязвимостей на страницу