Required CVE Record Information
Description
A vulnerability has been found in wanglongcn ltcms 1.0.20 and classified as critical. This vulnerability affects the function download of the file /api/test/download of the component API Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS 4 Total
Score | Severity | Version | Vector String |
---|---|---|---|
6.9 | MEDIUM | 4.0 | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N |
7.3 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
7.3 | HIGH | 3.0 | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
7.5 | — | 2.0 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Credits
- Dee.Mirage (VulDB User) reporter
References 4 Total
- vuldb.com: VDB-274360 | wanglongcn ltcms API Endpoint download server-side request forgery vdb-entrytechnical-description
- vuldb.com: VDB-274360 | CTI Indicators (IOB, IOC, IOA) signaturepermissions-required
- vuldb.com: Submit #386432 | ltcms.com ltcms V1.0.20 SSRF third-party-advisory
- https://github.com/DeepMountains/Mirage/blob/main/CVE14-1.md exploit