{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1849","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-03-02T17:08:35.010Z","datePublished":"2025-03-03T04:00:09.157Z","dateUpdated":"2025-03-03T17:20:51.596Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-03-03T04:00:09.157Z"},"title":"zj1983 zz import_data_todb server-side request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-918","lang":"en","description":"Server-Side Request Forgery"}]}],"affected":[{"vendor":"zj1983","product":"zz","versions":[{"version":"2024-8","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in zj1983 zz up to 2024-8. Affected by this vulnerability is an unknown functionality of the file /import_data_todb. The manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In zj1983 zz bis 2024-8 wurde eine kritische Schwachstelle entdeckt. Betroffen ist eine unbekannte Verarbeitung der Datei /import_data_todb. Mittels Manipulieren des Arguments url mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-03-02T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-03-02T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-03-02T18:13:39.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"redpomelo (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.298117","name":"VDB-298117 | zj1983 zz import_data_todb server-side request forgery","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.298117","name":"VDB-298117 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.505346","name":"Submit #505346 | https://gitee.com/zj1983/zz zz <=2024-8 SSRF","tags":["third-party-advisory"]},{"url":"https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_todb_SSRF.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_todb_SSRF.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-03T17:20:39.153980Z","id":"CVE-2025-1849","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-03T17:20:51.596Z"}}]}}