{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-7037","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-21T08:18:59.376Z","datePublished":"2023-12-21T17:00:05.727Z","dateUpdated":"2024-08-02T08:50:07.882Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-12-21T17:00:05.727Z"},"title":"automad FileController.php import server-side request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-918","lang":"en","description":"CWE-918 Server-Side Request Forgery"}]}],"affected":[{"vendor":"n/a","product":"automad","versions":[{"version":"1.10.0","status":"affected"},{"version":"1.10.1","status":"affected"},{"version":"1.10.2","status":"affected"},{"version":"1.10.3","status":"affected"},{"version":"1.10.4","status":"affected"},{"version":"1.10.5","status":"affected"},{"version":"1.10.6","status":"affected"},{"version":"1.10.7","status":"affected"},{"version":"1.10.8","status":"affected"},{"version":"1.10.9","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in automad up to 1.10.9. It has been declared as critical. This vulnerability affects the function import of the file FileController.php. The manipulation of the argument importUrl leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-248686 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In automad bis 1.10.9 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Das betrifft die Funktion import der Datei FileController.php. Durch das Beeinflussen des Arguments importUrl mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-12-21T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-21T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-12-21T09:24:27.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Maland (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.248686","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.248686","tags":["signature","permissions-required"]},{"url":"https://github.com/screetsec/VDD/tree/main/Automad%20CMS/Authenticated%20Blind%20SSRF","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:50:07.882Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.248686","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.248686","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/screetsec/VDD/tree/main/Automad%20CMS/Authenticated%20Blind%20SSRF","tags":["exploit","x_transferred"]}]}]}}