CVE-2020-23622

An issue in the UPnP protocol in 4thline cling 2.0.0 through 2.1.2 allows remote attackers to cause a denial of service via an unchecked CALLBACK parameter in the request header
Configurations

Configuration 1 (hide)

cpe:2.3:a:cling_project:cling:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:13

Type Values Removed Values Added
References () https://github.com/4thline/cling/issues/253 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://github.com/4thline/cling/issues/253 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://zh-cn.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of?tns_redirect=true - Not Applicable () https://zh-cn.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of?tns_redirect=true - Not Applicable

07 Nov 2023, 03:19

Type Values Removed Values Added
Summary ** UNSUPPORTED WHEN ASSIGNED ** An issue in the UPnP protocol in 4thline cling 2.0.0 through 2.1.2 allows remote attackers to cause a denial of service via an unchecked CALLBACK parameter in the request header. An issue in the UPnP protocol in 4thline cling 2.0.0 through 2.1.2 allows remote attackers to cause a denial of service via an unchecked CALLBACK parameter in the request header

Information

Published : 2022-08-15 20:15

Updated : 2024-11-21 05:13


NVD link : CVE-2020-23622

Mitre link : CVE-2020-23622

CVE.ORG link : CVE-2020-23622


JSON object : View

Products Affected

cling_project

  • cling
CWE
CWE-918

Server-Side Request Forgery (SSRF)