CVE-2022-36663

Gluu Oxauth before v4.4.1 allows attackers to execute blind SSRF (Server-Side Request Forgery) attacks via a crafted request_uri parameter.
References
Link Resource
https://github.com/GluuFederation/oxAuth/releases/tag/4.4.1 Release Notes Third Party Advisory
https://gluu.org/gluu-4-4-1/ Release Notes Vendor Advisory
https://github.com/GluuFederation/oxAuth/releases/tag/4.4.1 Release Notes Third Party Advisory
https://gluu.org/gluu-4-4-1/ Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gluu:oxauth:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:13

Type Values Removed Values Added
References () https://github.com/GluuFederation/oxAuth/releases/tag/4.4.1 - Release Notes, Third Party Advisory () https://github.com/GluuFederation/oxAuth/releases/tag/4.4.1 - Release Notes, Third Party Advisory
References () https://gluu.org/gluu-4-4-1/ - Release Notes, Vendor Advisory () https://gluu.org/gluu-4-4-1/ - Release Notes, Vendor Advisory

Information

Published : 2022-09-06 21:15

Updated : 2024-11-21 07:13


NVD link : CVE-2022-36663

Mitre link : CVE-2022-36663

CVE.ORG link : CVE-2022-36663


JSON object : View

Products Affected

gluu

  • oxauth
CWE
CWE-918

Server-Side Request Forgery (SSRF)