cvelist/2022/35xxx/CVE-2022-35583.json

77 lines
2.7 KiB
JSON
Raw Normal View History

2022-07-11 06:00:44 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-08-22 16:00:48 +00:00
"ID": "CVE-2022-35583",
"STATE": "PUBLIC"
2022-07-11 06:00:44 +00:00
},
2022-08-22 16:00:48 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-07-11 06:00:44 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-08-22 16:00:48 +00:00
"value": "wkhtmlTOpdf 0.12.6 is vulnerable to SSRF which allows an attacker to get initial access into the target's system by injecting iframe tag with initial asset IP address on it's source. This allows the attacker to takeover the whole infrastructure by accessing their internal assets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wkhtmltopdf.org/",
"refsource": "MISC",
"name": "https://wkhtmltopdf.org/"
},
{
"url": "https://drive.google.com/file/d/1LAmf_6CJLk5qDp0an2s_gVQ0TN2wmht5/view?usp=sharing",
"refsource": "MISC",
"name": "https://drive.google.com/file/d/1LAmf_6CJLk5qDp0an2s_gVQ0TN2wmht5/view?usp=sharing"
},
{
"refsource": "MISC",
"name": "https://cyber-guy.gitbook.io/cyber-guys-blog/blogs/initial-access-via-pdf-file-silently",
"url": "https://cyber-guy.gitbook.io/cyber-guys-blog/blogs/initial-access-via-pdf-file-silently"
2023-03-24 19:00:35 +00:00
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/171446/wkhtmltopdf-0.12.6-Server-Side-Request-Forgery.html",
"url": "http://packetstormsecurity.com/files/171446/wkhtmltopdf-0.12.6-Server-Side-Request-Forgery.html"
2022-07-11 06:00:44 +00:00
}
]
}
}