Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Server-Side Request Forgery vulnerability. During the download verification process of a JDBC driver the corresponding JDBC driver download address will be downloaded first, but this address will return a response page with complete error information when accessing a non-existent URL. Attackers can take advantage of this feature for SSRF.
References
Link | Resource |
---|---|
https://github.com/vran-dev/databasir/releases/tag/v1.0.2 | Release Notes Third Party Advisory |
https://github.com/vran-dev/databasir/security/advisories/GHSA-r8m9-r74j-vc6m | Exploit Third Party Advisory |
https://github.com/vran-dev/databasir/releases/tag/v1.0.2 | Release Notes Third Party Advisory |
https://github.com/vran-dev/databasir/security/advisories/GHSA-r8m9-r74j-vc6m | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/vran-dev/databasir/releases/tag/v1.0.2 - Release Notes, Third Party Advisory | |
References | () https://github.com/vran-dev/databasir/security/advisories/GHSA-r8m9-r74j-vc6m - Exploit, Third Party Advisory |
Information
Published : 2022-04-20 19:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-24862
Mitre link : CVE-2022-24862
CVE.ORG link : CVE-2022-24862
JSON object : View
Products Affected
databasir_project
- databasir
CWE
CWE-918
Server-Side Request Forgery (SSRF)