The application was vulnerable to a Server-Side Request Forgery attacks, allowing the backend server to interact with unexpected endpoints, potentially including internal and local services, leading to attacks in other downstream systems.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-43593 | The application was vulnerable to a Server-Side Request Forgery attacks, allowing the backend server to interact with unexpected endpoints, potentially including internal and local services, leading to attacks in other downstream systems. |
Tue, 06 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: TML
Published:
Updated: 2025-05-06T19:15:40.038Z
Reserved: 2022-09-08T00:00:00.000Z
Link: CVE-2022-40296
Updated: 2024-08-03T12:14:40.255Z
Status : Modified
Published: 2022-10-31T21:15:13.293
Modified: 2025-05-06T20:15:25.057
Link: CVE-2022-40296
No data.
OpenCVE Enrichment
No data.
EUVD