Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <1f5dfc41-3641-64e5-8531-6c10f28f5602@apache.org>
Date: Mon, 30 Jun 2025 03:09:33 +0000
From: Xue Weiming <mikexue@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-39954: Apache EventMesh Runtime: SSRF 

Severity: low 

Affected versions:

- Apache EventMesh Runtime (org.apache.eventmesh:eventmesh-runtime) 1.6.0 through 1.11.0

Description:

CWE-918 Server-Side Request Forgery (SSRF) in eventmesh-runtime module in WebhookUtil.java on windows\linux\mac os e.g. allows the attacker can abuse functionality on the server to read or update internal resources.
Users are recommended to upgrade to version 1.12.0 or use the master branch , which fixes this issue.

Credit:

Mak1r 808 <808mak1r@...il.com> (reporter)

References:

https://eventmesh.apache.org
https://www.cve.org/CVERecord?id=CVE-2024-39954

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.