CVE-2022-41949

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-41949
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-41949.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-41949
Related
  • GHSA-6qh9-rxc8-7943
Published
2022-12-08T22:15:10Z
Modified
2025-01-15T03:36:09.031661Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. In affected versions an authenticated DHIS2 user can craft a request to DHIS2 to instruct the server to make requests to external resources (like third party servers). This could allow an attacker, for example, to identify vulnerable services which might not be otherwise exposed to the public internet or to determine whether a specific file is present on the DHIS2 server. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. At this time, there is no known workaround or mitigation for this vulnerability.

References

Affected packages

Git / github.com/dhis2/dhis2-core

Affected ranges

Type
GIT
Repo
https://github.com/dhis2/dhis2-core
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

2.*

2.36.12