CVE-2024-6424

External server-side request vulnerability in MESbook 20221021.03 version, which could allow a remote, unauthenticated attacker to exploit the endpoint "/api/Proxy/Post?userName=&password=&uri=<FILE|INTERNAL URL|IP/HOST" or "/api/Proxy/Get?userName=&password=&uri=<ARCHIVO|URL INTERNA|IP/HOST" to read the source code of web files, read internal files or access network resources.
Configurations

No configuration.

History

21 Nov 2024, 09:49

Type Values Removed Values Added
References () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-mesbook - () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-mesbook -
Summary
  • (es) Vulnerabilidad de server-side request externo en la versión MESbook 20221021.03, que podría permitir que un atacante remoto no autenticado explote el endpoint "/api/Proxy/Post?userName=&amp;password=&amp;uri=

01 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-01 13:15

Updated : 2024-11-21 09:49


NVD link : CVE-2024-6424

Mitre link : CVE-2024-6424

CVE.ORG link : CVE-2024-6424


JSON object : View

Products Affected

No product.

CWE
CWE-918

Server-Side Request Forgery (SSRF)