CVE-2018-10220

Glastopf 3.1.3-dev has SSRF, as demonstrated by the abc.php a parameter. NOTE: the vendor indicates that this is intentional behavior because the product is a web application honeypot, and modules/handlers/emulators/rfi.py supports Remote File Inclusion emulation
References
Link Resource
https://github.com/mushorg/glastopf/issues/286 Exploit Issue Tracking Third Party Advisory
https://github.com/mushorg/glastopf/issues/286 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mushmush:glastopf:3.1.3:dev:*:*:*:*:*:*

History

21 Nov 2024, 03:41

Type Values Removed Values Added
References () https://github.com/mushorg/glastopf/issues/286 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/mushorg/glastopf/issues/286 - Exploit, Issue Tracking, Third Party Advisory

07 Nov 2023, 02:51

Type Values Removed Values Added
Summary ** DISPUTED ** Glastopf 3.1.3-dev has SSRF, as demonstrated by the abc.php a parameter. NOTE: the vendor indicates that this is intentional behavior because the product is a web application honeypot, and modules/handlers/emulators/rfi.py supports Remote File Inclusion emulation. Glastopf 3.1.3-dev has SSRF, as demonstrated by the abc.php a parameter. NOTE: the vendor indicates that this is intentional behavior because the product is a web application honeypot, and modules/handlers/emulators/rfi.py supports Remote File Inclusion emulation

Information

Published : 2018-04-19 08:29

Updated : 2024-11-21 03:41


NVD link : CVE-2018-10220

Mitre link : CVE-2018-10220

CVE.ORG link : CVE-2018-10220


JSON object : View

Products Affected

mushmush

  • glastopf
CWE
CWE-918

Server-Side Request Forgery (SSRF)