External server-side request vulnerability in MESbook 20221021.03 version, which could allow a remote, unauthenticated attacker to exploit the endpoint "/api/Proxy/Post?userName=&password=&uri=<FILE|INTERNAL URL|IP/HOST" or "/api/Proxy/Get?userName=&password=&uri=<ARCHIVO|URL INTERNA|IP/HOST" to read the source code of web files, read internal files or access network resources.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-mesbook | Third Party Advisory |
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-mesbook | Third Party Advisory |
Configurations
History
22 Oct 2025, 20:34
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mesbook:mesbook:20221021.03:*:*:*:*:*:*:* | |
References | () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-mesbook - Third Party Advisory | |
First Time |
Mesbook
Mesbook mesbook |
Information
Published : 2024-07-01 13:15
Updated : 2025-10-22 20:34
NVD link : CVE-2024-6424
Mitre link : CVE-2024-6424
CVE.ORG link : CVE-2024-6424
JSON object : View
Products Affected
mesbook
- mesbook
CWE
CWE-918
Server-Side Request Forgery (SSRF)