Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-23825
HistoryJan 30, 2024 - 4:22 p.m.

CVE-2024-23825 TablePress SSRF vulnerability due to insufficient filtering of cloud provider hosts

2024-01-3016:22:04
CWE-918
GitHub_M
www.cve.org
6
tablepress
ssrf
vulnerability
filtering
wordpress
http
requests
cloud
aws
metadata
exposure
credentials
fixed
2.2.5

CVSS3

3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

18.1%

TablePress is a table plugin for Wordpress. For importing tables, TablePress makes external HTTP requests based on a URL that is provided by the user. That user input is filtered insufficiently, which makes it is possible to send requests to unintended network locations and receive responses. On sites in a cloud environment like AWS, an attacker can potentially make GET requests to the instance’s metadata REST API. If the instance’s configuration is insecure, this can lead to the exposure of internal data, including credentials. This vulnerability is fixed in 2.2.5.

CNA Affected

[
  {
    "vendor": "TablePress",
    "product": "TablePress",
    "versions": [
      {
        "version": "< 2.2.5",
        "status": "affected"
      }
    ]
  }
]

CVSS3

3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

18.1%

Related for CVELIST:CVE-2024-23825