2024-03-05 19:00:29 +00:00
{
"id" : "CVE-2024-27563" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2024-03-05T17:15:06.947" ,
2025-01-21 17:04:09 +00:00
"lastModified" : "2025-01-21T15:08:45.213" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-03-05 19:00:29 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A Server-Side Request Forgery (SSRF) in the getFileFromRepo function of WonderCMS v3.1.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the pluginThemeUrl parameter."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Server-Side Request Forgery (SSRF) en la funci\u00f3n getFileFromRepo de WonderCMS v3.1.3 permite a los atacantes forzar a la aplicaci\u00f3n a realizar solicitudes arbitrarias mediante la inyecci\u00f3n de URL manipuladas en el par\u00e1metro pluginThemeUrl."
2024-03-05 19:00:29 +00:00
}
] ,
2024-08-29 22:03:16 +00:00
"metrics" : {
"cvssMetricV31" : [
2025-01-21 17:04:09 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
} ,
2024-08-29 22:03:16 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM" ,
2024-08-29 22:03:16 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-08-29 22:03:16 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 2.5
}
]
} ,
"weaknesses" : [
2025-01-21 17:04:09 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-918"
}
]
} ,
2024-08-29 22:03:16 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-918"
}
]
}
] ,
2025-01-21 17:04:09 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wondercms:wondercms:3.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C34DD4B5-9079-44C3-B20C-1B5DC5236D30"
}
]
}
]
}
] ,
2024-03-05 19:00:29 +00:00
"references" : [
{
"url" : "https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_pluginThemeUrl.md" ,
2025-01-21 17:04:09 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_pluginThemeUrl.md" ,
2025-01-21 17:04:09 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-03-05 19:00:29 +00:00
}
]
}