Total
1060 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-29180 | 1 Charm | 1 Charm | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
A vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched and is available in release [v0.12.1](https://github.com/charmbracelet/charm/releases/tag/v0.12.1). We recommend that all users running self-hosted `charm` instances update immediately. This vulnerability was found in-house and we haven't been notified of any potential exploiters. ### Additional notes * Encrypted user data uploaded to the Charm server is safe as Charm servers cannot decrypt user data. This includes filenames, paths, and all key-value data. * Users running the official Charm [Docker images](https://github.com/charmbracelet/charm/blob/main/docker.md) are at minimal risk because the exploit is limited to the containerized filesystem. | |||||
CVE-2022-31393 | 1 Jizhicms | 1 Jizhicms | 2023-12-10 | 6.4 MEDIUM | 9.1 CRITICAL |
Jizhicms v2.2.5 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the Index function in app/admin/c/PluginsController.php. | |||||
CVE-2021-46107 | 1 Ligeo-archives | 1 Ligeo Basics | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
Ligeo Archives Ligeo Basics as of 02_01-2022 is vulnerable to Server Side Request Forgery (SSRF) which allows an attacker to read any documents via the download features. | |||||
CVE-2022-28090 | 1 Ujcms | 1 Jspxcms | 2023-12-10 | 6.4 MEDIUM | 6.5 MEDIUM |
Jspxcms v10.2.0 allows attackers to execute a Server-Side Request Forgery (SSRF) via /cmscp/ext/collect/fetch_url.do?url=. | |||||
CVE-2022-27311 | 1 Gibbon Project | 1 Gibbon | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
Gibbon v3.4.4 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL. | |||||
CVE-2022-31390 | 1 Jizhicms | 1 Jizhicms | 2023-12-10 | 6.4 MEDIUM | 9.1 CRITICAL |
Jizhicms v2.2.5 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the Update function in app/admin/c/TemplateController.php. | |||||
CVE-2022-29309 | 1 Mysiteforme Project | 1 Mysiteforme | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
mysiteforme v2.2.1 was discovered to contain a Server-Side Request Forgery. | |||||
CVE-2022-28117 | 1 Naviwebs | 1 Navigate Cms | 2023-12-10 | 4.0 MEDIUM | 4.9 MEDIUM |
A Server-Side Request Forgery (SSRF) in feed_parser class of Navigate CMS v2.9.4 allows remote attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the feed parameter. | |||||
CVE-2021-20325 | 1 Redhat | 1 Enterprise Linux | 2023-12-10 | 10.0 HIGH | 9.8 CRITICAL |
Missing fixes for CVE-2021-40438 and CVE-2021-26691 in the versions of httpd, as shipped in Red Hat Enterprise Linux 8.5.0, causes a security regression compared to the versions shipped in Red Hat Enterprise Linux 8.4. A user who installs or updates to Red Hat Enterprise Linux 8.5.0 would be vulnerable to the mentioned CVEs, even if they were properly fixed in Red Hat Enterprise Linux 8.4. CVE-2021-20325 was assigned to that Red Hat specific security regression and it does not affect the upstream versions of httpd. | |||||
CVE-2021-45851 | 1 Frangoteam | 1 Fuxa | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
A Server-Side Request Forgery (SSRF) attack in FUXA 1.1.3 can be carried out leading to the obtaining of sensitive information from the server's internal environment and services, often potentially leading to the attacker executing commands on the server. | |||||
CVE-2022-0085 | 1 Dompdf Project | 1 Dompdf | 2023-12-10 | 4.3 MEDIUM | 5.3 MEDIUM |
Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0. | |||||
CVE-2022-22339 | 1 Ibm | 1 Planning Analytics | 2023-12-10 | 6.5 MEDIUM | 7.3 HIGH |
IBM Planning Analytics 2.0 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 219736. | |||||
CVE-2022-28616 | 1 Hp | 1 Oneview | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
A remote server-side request forgery (ssrf) vulnerability was discovered in HPE OneView version(s): Prior to 7.0. HPE has provided a software update to resolve this vulnerability in HPE OneView. | |||||
CVE-2022-0767 | 1 Calibre-web Project | 1 Calibre-web | 2023-12-10 | 7.5 HIGH | 9.9 CRITICAL |
Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17. | |||||
CVE-2021-39051 | 1 Ibm | 1 Spectrum Copy Data Management | 2023-12-10 | 6.4 MEDIUM | 6.5 MEDIUM |
IBM Spectrum Copy Data Management 2.2.0.0 through 2.2.14.3 is vulnerable to server-side request forgery, caused by improper input of application server registration function. A remote attacker could exploit this vulnerability using the host address and port fields of the application server registration form in the portal UI to enumerate and attack services that are running on those hosts. IBM X-Force ID: 214441. | |||||
CVE-2022-25850 | 1 Proxyscotch Project | 1 Proxyscotch | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
The package github.com/hoppscotch/proxyscotch before 1.0.0 are vulnerable to Server-side Request Forgery (SSRF) when interceptor mode is set to proxy. It occurs when an HTTP request is made by a backend server to an untrusted URL submitted by a user. It leads to a leakage of sensitive information from the server. | |||||
CVE-2022-31386 | 1 Nbnbk Project | 1 Nbnbk | 2023-12-10 | 6.4 MEDIUM | 9.1 CRITICAL |
A Server-Side Request Forgery (SSRF) in the getFileBinary function of nbnbk cms 3 allows attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the URL parameter. | |||||
CVE-2022-24871 | 1 Shopware | 1 Shopware | 2023-12-10 | 5.5 MEDIUM | 5.5 MEDIUM |
Shopware is an open commerce platform based on Symfony Framework and Vue. In affected versions an attacker can abuse the Admin SDK functionality on the server to read or update internal resources. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue. | |||||
CVE-2021-22969 | 1 Concretecms | 1 Concrete Cms | 2023-12-10 | 5.0 MEDIUM | 5.3 MEDIUM |
Concrete CMS (formerly concrete5) versions below 8.5.7 has a SSRF mitigation bypass using DNS Rebind attack giving an attacker the ability to fetch cloud IAAS (ex AWS) IAM keys.To fix this Concrete CMS no longer allows downloads from the local network and specifies the validated IP when downloading rather than relying on DNS.Discoverer: Adrian Tiron from FORTBRIDGE ( https://www.fortbridge.co.uk/ )The Concrete CMS team gave this a CVSS 3.1 score of 3.5 AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N . Please note that Cloud IAAS provider mis-configurations are not Concrete CMS vulnerabilities. A mitigation for this vulnerability is to make sure that the IMDS configurations are according to a cloud provider's best practices.This fix is also in Concrete version 9.0.0 | |||||
CVE-2021-23718 | 1 Ssrf-agent Project | 1 Ssrf-agent | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private. |