A Server-Side Request Forgery (SSRF) vulnerability in Group Office 6.4.196 allows a remote attacker to forge GET requests to arbitrary URLs via the url parameter to group/api/upload.php.
References
| Link | Resource |
|---|---|
| https://fatihhcelik.blogspot.com/2020/12/group-office-crm-ssrf.html | Exploit Third Party Advisory |
| https://fatihhcelik.github.io/posts/Group-Office-CRM-SSRF/ | Exploit Third Party Advisory |
| https://fatihhcelik.blogspot.com/2020/12/group-office-crm-ssrf.html | Exploit Third Party Advisory |
| https://fatihhcelik.github.io/posts/Group-Office-CRM-SSRF/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://fatihhcelik.blogspot.com/2020/12/group-office-crm-ssrf.html - Exploit, Third Party Advisory | |
| References | () https://fatihhcelik.github.io/posts/Group-Office-CRM-SSRF/ - Exploit, Third Party Advisory |
Information
Published : 2021-04-14 17:15
Updated : 2024-11-21 05:59
NVD link : CVE-2021-28060
Mitre link : CVE-2021-28060
CVE.ORG link : CVE-2021-28060
JSON object : View
Products Affected
group-office
- group_office
CWE
CWE-918
Server-Side Request Forgery (SSRF)
