SparkShop <=1.1.7 is vulnerable to server-side request forgery (SSRF). This vulnerability allows attacks to scan ports on the Intranet or local network where the server resides, attack applications running on the Intranet or local network, or read metadata on the cloud server.
References
Link | Resource |
---|---|
https://gist.github.com/RMAX2000/ebb654016e5b8a5b55aa6d8a7f2f321a#file-cve-2024-48107 | Third Party Advisory |
https://gitee.com/sparkshop/sparkshop | Product |
Configurations
History
18 Apr 2025, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/RMAX2000/ebb654016e5b8a5b55aa6d8a7f2f321a#file-cve-2024-48107 - Third Party Advisory | |
References | () https://gitee.com/sparkshop/sparkshop - Product | |
First Time |
Sparkshop sparkshop
Sparkshop |
|
CPE | cpe:2.3:a:sparkshop:sparkshop:*:*:*:*:*:*:*:* |
Information
Published : 2024-10-28 21:15
Updated : 2025-04-18 01:19
NVD link : CVE-2024-48107
Mitre link : CVE-2024-48107
CVE.ORG link : CVE-2024-48107
JSON object : View
Products Affected
sparkshop
- sparkshop
CWE
CWE-918
Server-Side Request Forgery (SSRF)