Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/sansanyun/mipjz/issues/17 |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 30 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mipjz Project
Mipjz Project mipjz |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:2.3:a:mipjz_project:mipjz:5.0.5:*:*:*:*:*:*:* | |
| Vendors & Products |
Mipjz Project
Mipjz Project mipjz |
|
| Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was found in mipjz 5.0.5. In the mipPost method of \app\setting\controller\ApiAdminTool.php, the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in a Server-side request forgery (SSRF) vulnerability that can read server files. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-30T19:10:24.432Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48232
Updated: 2024-10-30T19:10:19.041Z
Status : Analyzed
Published: 2024-10-25T21:15:04.170
Modified: 2025-07-07T17:33:49.187
Link: CVE-2024-48232
No data.
OpenCVE Enrichment
No data.