CVE-2020-24548

Ericom Access Server 9.2.0 (for AccessNow and Ericom Blaze) allows SSRF to make outbound WebSocket connection requests on arbitrary TCP ports, and provides "Cannot connect to" error messages to inform the attacker about closed ports.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ericom:access_server:9.2.0:*:*:*:*:*:x64:*

History

21 Nov 2024, 05:14

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/158962/Ericom-Access-Server-9.2.0-Server-Side-Request-Forgery.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/158962/Ericom-Access-Server-9.2.0-Server-Side-Request-Forgery.html - Exploit, Third Party Advisory, VDB Entry
References () https://www.youtube.com/watch?v=oDTd-yRxVJ0 - Exploit, Third Party Advisory () https://www.youtube.com/watch?v=oDTd-yRxVJ0 - Exploit, Third Party Advisory

Information

Published : 2020-08-26 19:15

Updated : 2024-11-21 05:14


NVD link : CVE-2020-24548

Mitre link : CVE-2020-24548

CVE.ORG link : CVE-2020-24548


JSON object : View

Products Affected

ericom

  • access_server
CWE
CWE-918

Server-Side Request Forgery (SSRF)