We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability, which was classified as problematic, was found in Stoque Zeev.it 4.24. This affects an unknown part of the file /Login?inpLostSession=1 of the component Login Page. The manipulation of the argument inpRedirectURL leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine problematische Schwachstelle in Stoque Zeev.it 4.24 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei /Login?inpLostSession=1 der Komponente Login Page. Mittels Manipulieren des Arguments inpRedirectURL mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
2025-03-11: | Advisory disclosed |
2025-03-11: | VulDB entry created |
2025-03-11: | VulDB entry last update |
Samuel Jesus (VulDB User)
Samuel Jesus (VulDB User)
vuldb.com/?id.299217 (VDB-299217 | Stoque Zeev.it Login Page server-side request forgery)
vuldb.com/?ctiid.299217 (VDB-299217 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.511708 (Submit #511708 | https://stoque.com.br Zeev 4.24 Zeev.it SSRF via inpRedirectURL Parameter on the Login Page)
drive.google.com/...TUj8FDOVMwfl9-7j8LRcK4V/view?usp=sharing
Support options