|
Message-ID: <tencent_6687C25A542A43764828D914ED19B2B6F205@qq.com> Date: Wed, 31 Jan 2024 15:49:54 +0800 From: "bismy" <bismy@...com> To: "oss-security" <oss-security@...ts.openwall.com> Cc: "dev" <dev@...vicecomb.apache.org> Subject: CVE-2023-44313: Apache ServiceComb Service-Center: attacker can perform SSRF through the frontend API Affected versions: - Apache ServiceComb Service-Center through 2.1.0 Description: Server-Side Request Forgery (SSRF) vulnerability in Apache ServiceComb Service-Center. Attackers can obtain sensitive server information through specially crafted requests.This issue affects Apache ServiceComb before 2.1.0(include). Users are recommended to upgrade to version 2.2.0, which fixes the issue. Credit: 苏 安 (finder) References: https://servicecomb.apache.org/ https://www.cve.org/CVERecord?id=CVE-2023-44313
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.