![]() |
|
Message-ID: <1f5dfc41-3641-64e5-8531-6c10f28f5602@apache.org> Date: Mon, 30 Jun 2025 03:09:33 +0000 From: Xue Weiming <mikexue@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-39954: Apache EventMesh Runtime: SSRF Severity: low Affected versions: - Apache EventMesh Runtime (org.apache.eventmesh:eventmesh-runtime) 1.6.0 through 1.11.0 Description: CWE-918 Server-Side Request Forgery (SSRF) in eventmesh-runtime module in WebhookUtil.java on windows\linux\mac os e.g. allows the attacker can abuse functionality on the server to read or update internal resources. Users are recommended to upgrade to version 1.12.0 or use the master branch , which fixes this issue. Credit: Mak1r 808 <808mak1r@...il.com> (reporter) References: https://eventmesh.apache.org https://www.cve.org/CVERecord?id=CVE-2024-39954
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.