{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1848","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-03-02T17:08:31.318Z","datePublished":"2025-03-03T03:31:04.563Z","dateUpdated":"2025-03-03T17:22:35.499Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-03-03T03:31:04.563Z"},"title":"zj1983 zz import_data_check server-side request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-918","lang":"en","description":"Server-Side Request Forgery"}]}],"affected":[{"vendor":"zj1983","product":"zz","versions":[{"version":"2024-8","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is an unknown function of the file /import_data_check. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in zj1983 zz bis 2024-8 entdeckt. Hiervon betroffen ist ein unbekannter Codeblock der Datei /import_data_check. Mittels dem Manipulieren des Arguments url mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-03-02T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-03-02T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-03-02T18:13:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"redpomelo (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.298116","name":"VDB-298116 | zj1983 zz import_data_check server-side request forgery","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.298116","name":"VDB-298116 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.505345","name":"Submit #505345 | https://gitee.com/zj1983/zz zz <=2024-8 SSRF","tags":["third-party-advisory"]},{"url":"https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_check_SSRF.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_check_SSRF.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-03T17:21:12.645379Z","id":"CVE-2025-1848","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-03T17:22:35.499Z"}}]}}