A critical SSRF vulnerability in Rebuild up to 3.5.5 (CVE-2024-1021
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | CVE-2024-1021 Rebuild HTTP Request readRawText server-side request forgery | 29 Jan 202422:00 | – | cvelist |
![]() | Server side request forgery (ssrf) | 29 Jan 202422:15 | – | prion |
![]() | CVE-2024-1021 | 29 Jan 202422:15 | – | osv |
![]() | CVE-2024-1021 | 29 Jan 202422:15 | – | nvd |
![]() | Rebuild <= 3.5.5 - Server-Side Request Forgery | 25 Feb 202404:56 | – | nuclei |
[
{
"vendor": "n/a",
"product": "Rebuild",
"versions": [
{
"version": "3.5.0",
"status": "affected"
},
{
"version": "3.5.1",
"status": "affected"
},
{
"version": "3.5.2",
"status": "affected"
},
{
"version": "3.5.3",
"status": "affected"
},
{
"version": "3.5.4",
"status": "affected"
},
{
"version": "3.5.5",
"status": "affected"
}
],
"modules": [
"HTTP Request Handler"
]
}
]
Source | Link |
---|---|
yuque | www.yuque.com/mailemonyeyongjuan/tha8tr/yemvnt5uo53gfem5 |
vuldb | www.vuldb.com/ |
vuldb | www.vuldb.com/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo