Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-50259
HistoryDec 22, 2023 - 5:15 p.m.

Server side request forgery (ssrf)

2023-12-2217:15:00
PRIOn knowledge base
www.prio-n.com
4
server side request forgery
medusa 1.0.19
ssrf vulnerability
unvalidated user input
blind ssrf

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.6%

Medusa is an automatic video library manager for TV shows. Versions prior to 1.0.19 are vulnerable to unauthenticated blind server-side request forgery (SSRF). The testslack request handler in medusa/server/web/home/handler.py does not validate the user-controlled slack_webhook variable and passes it to the notifiers.slack_notifier.test_notify method, then _notify_slack and finally _send_slack method, which sends a POST request to the user-controlled URL on line 103 in /medusa/notifiers/slack.py, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting POST requests on behalf of the Medusa server. Version 1.0.19 contains a fix for the issue.

CPENameOperatorVersion
medusalt1.0.19

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

20.6%

Related for PRION:CVE-2023-50259