CVE-2018-10220

Glastopf 3.1.3-dev has SSRF, as demonstrated by the abc.php a parameter. NOTE: the vendor indicates that this is intentional behavior because the product is a web application honeypot, and modules/handlers/emulators/rfi.py supports Remote File Inclusion emulation
References
Link Resource
https://github.com/mushorg/glastopf/issues/286 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mushmush:glastopf:3.1.3:dev:*:*:*:*:*:*

History

07 Nov 2023, 02:51

Type Values Removed Values Added
Summary ** DISPUTED ** Glastopf 3.1.3-dev has SSRF, as demonstrated by the abc.php a parameter. NOTE: the vendor indicates that this is intentional behavior because the product is a web application honeypot, and modules/handlers/emulators/rfi.py supports Remote File Inclusion emulation. Glastopf 3.1.3-dev has SSRF, as demonstrated by the abc.php a parameter. NOTE: the vendor indicates that this is intentional behavior because the product is a web application honeypot, and modules/handlers/emulators/rfi.py supports Remote File Inclusion emulation

Information

Published : 2018-04-19 08:29

Updated : 2024-04-11 00:59


NVD link : CVE-2018-10220

Mitre link : CVE-2018-10220

CVE.ORG link : CVE-2018-10220


JSON object : View

Products Affected

mushmush

  • glastopf
CWE
CWE-918

Server-Side Request Forgery (SSRF)