Ericom Access Server 9.2.0 (for AccessNow and Ericom Blaze) allows SSRF to make outbound WebSocket connection requests on arbitrary TCP ports, and provides "Cannot connect to" error messages to inform the attacker about closed ports.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/158962/Ericom-Access-Server-9.2.0-Server-Side-Request-Forgery.html | Exploit Third Party Advisory VDB Entry |
https://www.youtube.com/watch?v=oDTd-yRxVJ0 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/158962/Ericom-Access-Server-9.2.0-Server-Side-Request-Forgery.html | Exploit Third Party Advisory VDB Entry |
https://www.youtube.com/watch?v=oDTd-yRxVJ0 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/158962/Ericom-Access-Server-9.2.0-Server-Side-Request-Forgery.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.youtube.com/watch?v=oDTd-yRxVJ0 - Exploit, Third Party Advisory |
Information
Published : 2020-08-26 19:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24548
Mitre link : CVE-2020-24548
CVE.ORG link : CVE-2020-24548
JSON object : View
Products Affected
ericom
- access_server
CWE
CWE-918
Server-Side Request Forgery (SSRF)