GHSA-c3q8-hh69-7mg5

Suggest an improvement
Source
https://github.com/advisories/GHSA-c3q8-hh69-7mg5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-c3q8-hh69-7mg5/GHSA-c3q8-hh69-7mg5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-c3q8-hh69-7mg5
Aliases
Published
2022-05-24T17:26:24Z
Modified
2024-04-25T22:43:37.282377Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Codiad SSRF Vulnerability
Details

A Server-Side Request Forgery (SSRF) vulnerability was found in Codiad v1.7.8 and later. A user with admin privileges could use the plugin install feature to make the server request any URL via components/market/class.market.php. This could potentially result in remote code execution. NOTE: the vendor states "Codiad is no longer under active maintenance by core contributors."

Database specific
{
    "nvd_published_at": "2020-08-24T16:15:00Z",
    "cwe_ids": [
        "CWE-918"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-04-25T22:19:54Z"
}
References

Affected packages

Packagist / codiad/codiad

Package

Name
codiad/codiad
Purl
pkg:composer/codiad/codiad

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.7.8
Last affected
2.8.4