cve/2024/CVE-2024-29029.md

19 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-29029](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29029)
![](https://img.shields.io/static/v1?label=Product&message=memos&color=blue)
2024-08-05 18:41:32 +00:00
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%200.22.0%20&color=brighgreen)
2024-05-25 21:48:12 +02:00
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)&color=brighgreen)
### Description
2024-08-05 18:41:32 +00:00
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/image that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability. Version 0.22.0 of memos removes the vulnerable file.
2024-05-25 21:48:12 +02:00
### POC
#### Reference
- https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/ARPSyndicate/cve-scores
2024-05-25 21:48:12 +02:00