CVE-2024-48107

SparkShop <=1.1.7 is vulnerable to server-side request forgery (SSRF). This vulnerability allows attacks to scan ports on the Intranet or local network where the server resides, attack applications running on the Intranet or local network, or read metadata on the cloud server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sparkshop:sparkshop:*:*:*:*:*:*:*:*

History

18 Apr 2025, 01:19

Type Values Removed Values Added
References () https://gist.github.com/RMAX2000/ebb654016e5b8a5b55aa6d8a7f2f321a#file-cve-2024-48107 - () https://gist.github.com/RMAX2000/ebb654016e5b8a5b55aa6d8a7f2f321a#file-cve-2024-48107 - Third Party Advisory
References () https://gitee.com/sparkshop/sparkshop - () https://gitee.com/sparkshop/sparkshop - Product
First Time Sparkshop sparkshop
Sparkshop
CPE cpe:2.3:a:sparkshop:sparkshop:*:*:*:*:*:*:*:*

Information

Published : 2024-10-28 21:15

Updated : 2025-04-18 01:19


NVD link : CVE-2024-48107

Mitre link : CVE-2024-48107

CVE.ORG link : CVE-2024-48107


JSON object : View

Products Affected

sparkshop

  • sparkshop
CWE
CWE-918

Server-Side Request Forgery (SSRF)