CVE-2022-24862

Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Server-Side Request Forgery vulnerability. During the download verification process of a JDBC driver the corresponding JDBC driver download address will be downloaded first, but this address will return a response page with complete error information when accessing a non-existent URL. Attackers can take advantage of this feature for SSRF.
Configurations

Configuration 1 (hide)

cpe:2.3:a:databasir_project:databasir:1.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 06:51

Type Values Removed Values Added
References () https://github.com/vran-dev/databasir/releases/tag/v1.0.2 - Release Notes, Third Party Advisory () https://github.com/vran-dev/databasir/releases/tag/v1.0.2 - Release Notes, Third Party Advisory
References () https://github.com/vran-dev/databasir/security/advisories/GHSA-r8m9-r74j-vc6m - Exploit, Third Party Advisory () https://github.com/vran-dev/databasir/security/advisories/GHSA-r8m9-r74j-vc6m - Exploit, Third Party Advisory

Information

Published : 2022-04-20 19:15

Updated : 2024-11-21 06:51


NVD link : CVE-2022-24862

Mitre link : CVE-2022-24862

CVE.ORG link : CVE-2022-24862


JSON object : View

Products Affected

databasir_project

  • databasir
CWE
CWE-918

Server-Side Request Forgery (SSRF)