Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 31 Jan 2024 15:49:54 +0800
From: "bismy" <bismy@...com>
To: "oss-security" <oss-security@...ts.openwall.com>
Cc: "dev" <dev@...vicecomb.apache.org>
Subject: CVE-2023-44313: Apache ServiceComb Service-Center: attacker can perform SSRF through the frontend API 

Affected versions:

- Apache ServiceComb Service-Center through 2.1.0

Description:

Server-Side Request Forgery (SSRF) vulnerability in Apache ServiceComb Service-Center. Attackers can obtain sensitive server information through specially crafted requests.This issue affects Apache ServiceComb before 2.1.0(include).

Users are recommended to upgrade to version 2.2.0, which fixes the issue.

Credit:

苏 安  (finder)

References:

https://servicecomb.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-44313

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.