mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
25 lines
1.8 KiB
JSON
25 lines
1.8 KiB
JSON
{
|
|
"id": "CVE-2024-25738",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-05-22T19:15:08.807",
|
|
"lastModified": "2024-05-24T01:15:30.977",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad de Server-Side Request Forgery (SSRF) en la ruta /Upgrade/FixConfig en Open Library Foundation VuFind 2.0 hasta 9.1 anterior a 9.1.1 permite a un atacante remoto sobrescribir archivos de configuraci\u00f3n locales para obtener acceso al panel de administrador y lograr la ejecuci\u00f3n remota de c\u00f3digo. Un factor atenuante es que requiere que est\u00e9 activada la configuraci\u00f3n de tiempo de ejecuci\u00f3n de PHP enable_url_include, que est\u00e1 desactivada en las instalaciones predeterminadas. Tambi\u00e9n requiere que se exponga la ruta /Upgrade, que se expone de forma predeterminada despu\u00e9s de instalar VuFind, y se recomienda deshabilitarla configurando autoConfigure en false en config.ini."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://vufind.org/wiki/security:cve-2024-25738",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |