CVE-2024-36471

Import functionality is vulnerable to DNS rebinding attacks between verification and processing of the URL.  Project administrators can run these imports, which could cause Allura to read from internal services and expose them. This issue affects Apache Allura from 1.0.1 through 1.16.0. Users are recommended to upgrade to version 1.17.0, which fixes the issue. If you are unable to upgrade, set "disable_entry_points.allura.importers = forge-tracker, forge-discussion" in your .ini config file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:allura:*:*:*:*:*:*:*:*

History

15 Jul 2025, 16:36

Type Values Removed Values Added
References () https://lists.apache.org/thread/g43164t4bcp0tjwt4opxyks4svm8kvbh - () https://lists.apache.org/thread/g43164t4bcp0tjwt4opxyks4svm8kvbh - Mailing List, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2024/06/10/1 - () http://www.openwall.com/lists/oss-security/2024/06/10/1 - Mailing List, Third Party Advisory
CPE cpe:2.3:a:apache:allura:*:*:*:*:*:*:*:*
First Time Apache allura
Apache

Information

Published : 2024-06-10 22:15

Updated : 2025-07-15 16:36


NVD link : CVE-2024-36471

Mitre link : CVE-2024-36471

CVE.ORG link : CVE-2024-36471


JSON object : View

Products Affected

apache

  • allura
CWE
CWE-20

Improper Input Validation

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-918

Server-Side Request Forgery (SSRF)