CVE-2023-46236

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-46236
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46236.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-46236
Aliases
  • GHSA-8qg4-9363-873h
Published
2023-10-31T14:32:32.703Z
Modified
2025-12-05T00:09:20.149017Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
FOG SSRF via unauthenticated endpoint(s)
Details

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to version 1.5.10, a server-side-request-forgery (SSRF) vulnerability allowed an unauthenticated user to trigger a GET request as the server to an arbitrary endpoint and URL scheme. This also allows remote access to files visible to the Apache user group. Other impacts vary based on server configuration. Version 1.5.10 contains a patch.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-918"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/46xxx/CVE-2023-46236.json"
}
References

Affected packages

Git / github.com/fogproject/fogproject

Affected ranges

Type
GIT
Repo
https://github.com/fogproject/fogproject
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.3.0
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.4.0
1.4.1
1.4.2
1.4.3
1.4.4
1.5.0
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
1.5.7
1.5.8
1.5.9
1.5.9-RC1
1.5.9-RC2