We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-46236

FOG SSRF via unauthenticated endpoint(s)



AssignerGitHub_M
Reserved2023-10-19
Published2023-10-31
Updated2024-09-05

Description

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to version 1.5.10, a server-side-request-forgery (SSRF) vulnerability allowed an unauthenticated user to trigger a GET request as the server to an arbitrary endpoint and URL scheme. This also allows remote access to files visible to the Apache user group. Other impacts vary based on server configuration. Version 1.5.10 contains a patch.



HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 1.5.10
affected

References

https://github.com/FOGProject/fogproject/security/advisories/GHSA-8qg4-9363-873h

https://github.com/FOGProject/fogproject/commit/9125f35ff649a3e7fd7771b1c8e5add3c726f763

cve.org CVE-2023-46236

nvd.nist.gov CVE-2023-46236

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-46236
Subscribe to our newsletter to learn more about our work.