Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-0905

Summary
Assigner-hackerone
Assigner Org ID-36234546-b8fa-4601-9d6f-f4e334aa8ea1
Published At-13 Nov, 2017 | 17:00
Updated At-16 Sep, 2024 | 23:56
Rejected At-
Credits

The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:hackerone
Assigner Org ID:36234546-b8fa-4601-9d6f-f4e334aa8ea1
Published At:13 Nov, 2017 | 17:00
Updated At:16 Sep, 2024 | 23:56
Rejected At:
▼CVE Numbering Authority (CNA)

The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.

Affected Products
Vendor
Recurly
Product
recurly ruby gem
Versions
Affected
  • Versions before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3
Problem Types
TypeCWE IDDescription
CWECWE-918Server-Side Request Forgery (SSRF) (CWE-918)
Type: CWE
CWE ID: CWE-918
Description: Server-Side Request Forgery (SSRF) (CWE-918)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://dev.recurly.com/page/ruby-updates
x_refsource_CONFIRM
https://hackerone.com/reports/288635
x_refsource_MISC
https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be
x_refsource_CONFIRM
Hyperlink: https://dev.recurly.com/page/ruby-updates
Resource:
x_refsource_CONFIRM
Hyperlink: https://hackerone.com/reports/288635
Resource:
x_refsource_MISC
Hyperlink: https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://dev.recurly.com/page/ruby-updates
x_refsource_CONFIRM
x_transferred
https://hackerone.com/reports/288635
x_refsource_MISC
x_transferred
https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be
x_refsource_CONFIRM
x_transferred
Hyperlink: https://dev.recurly.com/page/ruby-updates
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://hackerone.com/reports/288635
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:support@hackerone.com
Published At:13 Nov, 2017 | 17:29
Updated At:20 Apr, 2025 | 01:37

The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.09.8CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.0
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

recurly
recurly
>>recurly_client_ruby>>2.0.0
cpe:2.3:a:recurly:recurly_client_ruby:2.0.0:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.1
cpe:2.3:a:recurly:recurly_client_ruby:2.0.1:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.2
cpe:2.3:a:recurly:recurly_client_ruby:2.0.2:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.3
cpe:2.3:a:recurly:recurly_client_ruby:2.0.3:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.4
cpe:2.3:a:recurly:recurly_client_ruby:2.0.4:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.5
cpe:2.3:a:recurly:recurly_client_ruby:2.0.5:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.6
cpe:2.3:a:recurly:recurly_client_ruby:2.0.6:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.7
cpe:2.3:a:recurly:recurly_client_ruby:2.0.7:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.8
cpe:2.3:a:recurly:recurly_client_ruby:2.0.8:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.9
cpe:2.3:a:recurly:recurly_client_ruby:2.0.9:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.10
cpe:2.3:a:recurly:recurly_client_ruby:2.0.10:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.11
cpe:2.3:a:recurly:recurly_client_ruby:2.0.11:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.0.12
cpe:2.3:a:recurly:recurly_client_ruby:2.0.12:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.0
cpe:2.3:a:recurly:recurly_client_ruby:2.1.0:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.0
cpe:2.3:a:recurly:recurly_client_ruby:2.1.0:c:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.1
cpe:2.3:a:recurly:recurly_client_ruby:2.1.1:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.2
cpe:2.3:a:recurly:recurly_client_ruby:2.1.2:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.3
cpe:2.3:a:recurly:recurly_client_ruby:2.1.3:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.4
cpe:2.3:a:recurly:recurly_client_ruby:2.1.4:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.5
cpe:2.3:a:recurly:recurly_client_ruby:2.1.5:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.6
cpe:2.3:a:recurly:recurly_client_ruby:2.1.6:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.7
cpe:2.3:a:recurly:recurly_client_ruby:2.1.7:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.8
cpe:2.3:a:recurly:recurly_client_ruby:2.1.8:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.9
cpe:2.3:a:recurly:recurly_client_ruby:2.1.9:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.1.10
cpe:2.3:a:recurly:recurly_client_ruby:2.1.10:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.2.0
cpe:2.3:a:recurly:recurly_client_ruby:2.2.0:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.2.1
cpe:2.3:a:recurly:recurly_client_ruby:2.2.1:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.2.2
cpe:2.3:a:recurly:recurly_client_ruby:2.2.2:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.2.3
cpe:2.3:a:recurly:recurly_client_ruby:2.2.3:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.2.4
cpe:2.3:a:recurly:recurly_client_ruby:2.2.4:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.3.0
cpe:2.3:a:recurly:recurly_client_ruby:2.3.0:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.3.0
cpe:2.3:a:recurly:recurly_client_ruby:2.3.0:beta1:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.3.1
cpe:2.3:a:recurly:recurly_client_ruby:2.3.1:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.3.2
cpe:2.3:a:recurly:recurly_client_ruby:2.3.2:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.3.3
cpe:2.3:a:recurly:recurly_client_ruby:2.3.3:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.3.4
cpe:2.3:a:recurly:recurly_client_ruby:2.3.4:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.3.5
cpe:2.3:a:recurly:recurly_client_ruby:2.3.5:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.3.6
cpe:2.3:a:recurly:recurly_client_ruby:2.3.6:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.3.7
cpe:2.3:a:recurly:recurly_client_ruby:2.3.7:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.3.8
cpe:2.3:a:recurly:recurly_client_ruby:2.3.8:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.3.9
cpe:2.3:a:recurly:recurly_client_ruby:2.3.9:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.4.0
cpe:2.3:a:recurly:recurly_client_ruby:2.4.0:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.4.1
cpe:2.3:a:recurly:recurly_client_ruby:2.4.1:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.4.2
cpe:2.3:a:recurly:recurly_client_ruby:2.4.2:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.4.3
cpe:2.3:a:recurly:recurly_client_ruby:2.4.3:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.4.4
cpe:2.3:a:recurly:recurly_client_ruby:2.4.4:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.4.5
cpe:2.3:a:recurly:recurly_client_ruby:2.4.5:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.4.6
cpe:2.3:a:recurly:recurly_client_ruby:2.4.6:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.4.7
cpe:2.3:a:recurly:recurly_client_ruby:2.4.7:*:*:*:*:*:*:*
recurly
recurly
>>recurly_client_ruby>>2.4.8
cpe:2.3:a:recurly:recurly_client_ruby:2.4.8:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-918Secondarysupport@hackerone.com
CWE-918Primarynvd@nist.gov
CWE ID: CWE-918
Type: Secondary
Source: support@hackerone.com
CWE ID: CWE-918
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://dev.recurly.com/page/ruby-updatessupport@hackerone.com
Vendor Advisory
https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4besupport@hackerone.com
Patch
Third Party Advisory
https://hackerone.com/reports/288635support@hackerone.com
Permissions Required
https://dev.recurly.com/page/ruby-updatesaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4beaf854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
https://hackerone.com/reports/288635af854a3a-2127-422b-91ae-364da2661108
Permissions Required
Hyperlink: https://dev.recurly.com/page/ruby-updates
Source: support@hackerone.com
Resource:
Vendor Advisory
Hyperlink: https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be
Source: support@hackerone.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://hackerone.com/reports/288635
Source: support@hackerone.com
Resource:
Permissions Required
Hyperlink: https://dev.recurly.com/page/ruby-updates
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Hyperlink: https://hackerone.com/reports/288635
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Permissions Required

Change History

0
Information is not available yet

Similar CVEs

124Records found

CVE-2024-7740
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.27% / 50.17%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 20:00
Updated-21 Aug, 2024 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wanglongcn ltcms API Endpoint download server-side request forgery

A vulnerability has been found in wanglongcn ltcms 1.0.20 and classified as critical. This vulnerability affects the function download of the file /api/test/download of the component API Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-ltcmswanglongcnwanglongcn
Product-ltcmsltcmsltcms
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2024-7743
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.09% / 26.41%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 21:00
Updated-21 Aug, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wanglongcn ltcms API Endpoint downloadUrl server-side request forgery

A vulnerability was found in wanglongcn ltcms 1.0.20. It has been declared as critical. Affected by this vulnerability is the function downloadUrl of the file /api/file/downloadUrl of the component API Endpoint. The manipulation of the argument file leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-ltcmswanglongcnwanglongcn
Product-ltcmsltcmsltcms
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-13484
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.73% / 71.80%
||
7 Day CHG~0.00%
Published-24 Jun, 2020 | 14:28
Updated-04 Aug, 2024 | 12:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bitrix24 through 20.0.975 allows SSRF via an intranet IP address in the services/main/ajax.php?action=attachUrlPreview url parameter, if the destination URL hosts an HTML document containing '<meta name="og:image" content="' followed by an intranet URL.

Action-Not Available
Vendor-n/aBitrix24
Product-bitrix24n/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-1386
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-9.8||CRITICAL
EPSS-93.32% / 99.80%
||
7 Day CHG~0.00%
Published-16 May, 2022 | 14:30
Updated-03 Aug, 2024 | 00:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fusion Builder < 3.6.2 - Unauthenticated SSRF

The Fusion Builder WordPress plugin before 3.6.2, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.

Action-Not Available
Vendor-UnknownAvada (ThemeFusion)
Product-avadafusion_builderFusion Builder
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-0766
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-6.5||MEDIUM
EPSS-0.27% / 50.44%
||
7 Day CHG~0.00%
Published-07 Mar, 2022 | 07:05
Updated-19 Nov, 2024 | 13:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) in janeczku/calibre-web

Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17.

Action-Not Available
Vendor-janeczkujaneczku
Product-calibre-webjaneczku/calibre-web
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-0939
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-9||CRITICAL
EPSS-0.25% / 47.80%
||
7 Day CHG~0.00%
Published-04 Apr, 2022 | 09:40
Updated-19 Nov, 2024 | 13:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) in janeczku/calibre-web

Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18.

Action-Not Available
Vendor-janeczkujaneczku
Product-calibre-webjaneczku/calibre-web
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-0767
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-9.1||CRITICAL
EPSS-0.19% / 40.66%
||
7 Day CHG~0.00%
Published-07 Mar, 2022 | 07:05
Updated-19 Nov, 2024 | 13:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) in janeczku/calibre-web

Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17.

Action-Not Available
Vendor-janeczkujaneczku
Product-calibre-webjaneczku/calibre-web
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-0086
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-8.2||HIGH
EPSS-0.34% / 55.76%
||
7 Day CHG~0.00%
Published-04 Jan, 2022 | 17:15
Updated-02 Aug, 2024 | 23:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) in transloadit/uppy

uppy is vulnerable to Server-Side Request Forgery (SSRF)

Action-Not Available
Vendor-transloadittransloadit
Product-uppytransloadit/uppy
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2022-0339
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-6.5||MEDIUM
EPSS-0.24% / 47.66%
||
7 Day CHG~0.00%
Published-30 Jan, 2022 | 13:17
Updated-19 Nov, 2024 | 13:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-Side Request Forgery (SSRF) in janeczku/calibre-web

Server-Side Request Forgery (SSRF) in Pypi calibreweb prior to 0.6.16.

Action-Not Available
Vendor-janeczkujaneczku
Product-calibre-webjaneczku/calibre-web
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-10956
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 34.17%
||
7 Day CHG~0.00%
Published-27 Mar, 2020 | 18:25
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GitLab 8.10 and later through 12.9 is vulnerable to an SSRF in a project import note feature.

Action-Not Available
Vendor-n/aGitLab Inc.
Product-gitlabn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-10980
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 36.69%
||
7 Day CHG~0.00%
Published-08 Apr, 2020 | 18:05
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GitLab EE/CE 8.0.rc1 to 12.9 is vulnerable to a blind SSRF in the FogBugz integration.

Action-Not Available
Vendor-n/aGitLab Inc.
Product-gitlabn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-10077
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 34.17%
||
7 Day CHG~0.00%
Published-13 Mar, 2020 | 17:01
Updated-04 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GitLab EE 3.0 through 12.8.1 allows SSRF. An internal investigation revealed that a particular deprecated service was creating a server side request forgery risk.

Action-Not Available
Vendor-n/aGitLab Inc.
Product-gitlabn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2019-9827
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-4.59% / 88.81%
||
7 Day CHG~0.00%
Published-03 Jul, 2019 | 20:13
Updated-04 Aug, 2024 | 22:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hawt Hawtio through 2.5.0 is vulnerable to SSRF, allowing a remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial /proxy/ substring of a URI.

Action-Not Available
Vendor-hawtn/a
Product-hawtion/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2019-9174
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||CRITICAL
EPSS-0.36% / 57.02%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 16:17
Updated-04 Aug, 2024 | 21:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It allows SSRF.

Action-Not Available
Vendor-n/aGitLab Inc.
Product-gitlabn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-41403
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.49% / 64.59%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 21:11
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

flatCore-CMS version 2.0.8 calls dangerous functions, causing server-side request forgery vulnerabilities.

Action-Not Available
Vendor-flatcoren/a
Product-flatcore-cmsn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-4101
Matching Score-4
Assigner-HCL Software
ShareView Details
Matching Score-4
Assigner-HCL Software
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 60.36%
||
7 Day CHG~0.00%
Published-11 Jun, 2020 | 13:20
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

"HCL Digital Experience is susceptible to Server Side Request Forgery."

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-hcl_digital_experience"HCL Digital Experience"
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-37353
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.37% / 84.31%
||
7 Day CHG~0.00%
Published-13 Aug, 2021 | 11:29
Updated-04 Aug, 2024 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nagios XI Docker Wizard before version 1.1.3 is vulnerable to SSRF due to improper sanitation in table_population.php.

Action-Not Available
Vendor-n/aNagios Enterprises, LLC
Product-nagios_xi_docker_wizardn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-31531
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-5.64% / 89.99%
||
7 Day CHG~0.00%
Published-29 Jun, 2021 | 13:13
Updated-30 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zoho ManageEngine ServiceDesk Plus MSP before 10521 is vulnerable to Server-Side Request Forgery (SSRF).

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.
Product-manageengine_servicedesk_plus_mspn/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-26855
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.1||CRITICAL
EPSS-94.34% / 99.95%
||
7 Day CHG-0.01%
Published-02 Mar, 2021 | 23:55
Updated-30 Jul, 2025 | 01:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2021-04-16||Apply updates per vendor instructions.
Microsoft Exchange Server Remote Code Execution Vulnerability

Microsoft Exchange Server Remote Code Execution Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-exchange_serverMicrosoft Exchange Server 2019 Cumulative Update 7Microsoft Exchange Server 2013 Cumulative Update 22Microsoft Exchange Server 2019 Cumulative Update 5Microsoft Exchange Server 2013 Cumulative Update 23Microsoft Exchange Server 2016 Cumulative Update 15Microsoft Exchange Server 2019 Cumulative Update 8Microsoft Exchange Server 2019 Cumulative Update 1Microsoft Exchange Server 2019 Cumulative Update 4Microsoft Exchange Server 2016 Cumulative Update 14Microsoft Exchange Server 2019 Cumulative Update 3Microsoft Exchange Server 2019 Cumulative Update 2Microsoft Exchange Server 2019 Cumulative Update 6Microsoft Exchange Server 2016 Cumulative Update 8Microsoft Exchange Server 2016 Cumulative Update 11Microsoft Exchange Server 2016 Cumulative Update 10Microsoft Exchange Server 2016 Cumulative Update 17Microsoft Exchange Server 2016 Cumulative Update 12Microsoft Exchange Server 2016 Cumulative Update 16Microsoft Exchange Server 2019Microsoft Exchange Server 2013 Cumulative Update 21Microsoft Exchange Server 2016 Cumulative Update 9Microsoft Exchange Server 2016 Cumulative Update 19Microsoft Exchange Server 2016 Cumulative Update 18Microsoft Exchange Server 2016 Cumulative Update 13Exchange Server
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2013-4864
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-30.46% / 96.54%
||
7 Day CHG~0.00%
Published-28 Jan, 2020 | 16:09
Updated-06 Aug, 2024 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MiCasaVerde VeraLite with firmware 1.5.408 allows remote attackers to send HTTP requests to intranet servers via the url parameter to cgi-bin/cmh/proxy.sh, related to a Server-Side Request Forgery (SSRF) issue.

Action-Not Available
Vendor-micasaverden/a
Product-veraliteveralite_firmwaren/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-22049
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-9.8||CRITICAL
EPSS-0.89% / 74.56%
||
7 Day CHG~0.00%
Published-24 Nov, 2021 | 16:32
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vSphere Web Client (FLEX/Flash) contains an SSRF (Server Side Request Forgery) vulnerability in the vSAN Web Client (vSAN UI) plug-in. A malicious actor with network access to port 443 on vCenter Server may exploit this issue by accessing a URL request outside of vCenter Server or accessing an internal service.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-vcenter_serverVMware vCenter Server and VMware Cloud Foundation
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2021-1627
Matching Score-4
Assigner-Salesforce, Inc.
ShareView Details
Matching Score-4
Assigner-Salesforce, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 60.36%
||
7 Day CHG~0.00%
Published-26 Mar, 2021 | 16:17
Updated-03 Aug, 2024 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MuleSoft is aware of a Server Side Request Forgery vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers. This affects: Mule 3.8.x,3.9.x,4.x runtime released before February 2, 2021.

Action-Not Available
Vendor-salesforcen/a
Product-muleMulesoft
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2020-8540
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-22.47% / 95.62%
||
7 Day CHG~0.00%
Published-11 Mar, 2020 | 16:15
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An XML external entity (XXE) vulnerability in Zoho ManageEngine Desktop Central before the 07-Mar-2020 update allows remote unauthenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.
Product-manageengine_desktop_centraln/a
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2017-1000237
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.46% / 63.03%
||
7 Day CHG~0.00%
Published-17 Nov, 2017 | 04:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

I, Librarian version <=4.6 & 4.7 is vulnerable to Server-Side Request Forgery in the ajaxsupplement.php resulting in the attacker being able to reset any user's password.

Action-Not Available
Vendor-i-librariann/a
Product-i_librariann/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found