cvelist/2024/4xxx/CVE-2024-4851.json

87 lines
3.2 KiB
JSON
Raw Normal View History

2024-05-13 22:00:32 +00:00
{
2024-06-06 19:00:35 +00:00
"data_version": "4.0",
2024-05-13 22:00:32 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-4851",
2024-06-06 19:00:35 +00:00
"ASSIGNER": "security@huntr.com",
"STATE": "PUBLIC"
2024-05-13 22:00:32 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-06-06 19:00:35 +00:00
"value": "A Server-Side Request Forgery (SSRF) vulnerability exists in the stangirard/quivr application, version 0.0.204, which allows attackers to access internal networks. The vulnerability is present in the crawl endpoint where the 'url' parameter can be manipulated to send HTTP requests to arbitrary URLs, thereby facilitating SSRF attacks. The affected code is located in the backend/routes/crawl_routes.py file, specifically within the crawl_endpoint function. This issue could allow attackers to interact with internal services that are accessible from the server hosting the application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-918 Server-Side Request Forgery (SSRF)",
"cweId": "CWE-918"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "stangirard",
"product": {
"product_data": [
{
"product_name": "stangirard/quivr",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "unspecified",
"version_value": "latest"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://huntr.com/bounties/b6011986-954a-47da-a60c-fc7aebc8005d",
"refsource": "MISC",
"name": "https://huntr.com/bounties/b6011986-954a-47da-a60c-fc7aebc8005d"
}
]
},
"source": {
"advisory": "b6011986-954a-47da-a60c-fc7aebc8005d",
"discovery": "EXTERNAL"
},
"impact": {
"cvss": [
{
"version": "3.0",
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH"
2024-05-13 22:00:32 +00:00
}
]
}
}