Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/sansanyun/mipjz/issues/18 |
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 29 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mipjz Project
Mipjz Project mipjz |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:2.3:a:mipjz_project:mipjz:5.0.5:*:*:*:*:*:*:* | |
| Vendors & Products |
Mipjz Project
Mipjz Project mipjz |
|
| Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in mipjz 5.0.5. In the push method of app\tag\controller\ApiAdminTag.php the value of the postAddress parameter is not processed and is directly passed into curl_exec execution and output, resulting in Server-side request forgery (SSRF) vulnerability that can read server files. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-29T19:00:05.431Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48234
Updated: 2024-10-29T18:59:58.733Z
Status : Deferred
Published: 2024-10-25T22:15:02.453
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-48234
No data.
OpenCVE Enrichment
No data.