Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-39967
HistorySep 06, 2023 - 8:40 p.m.

CVE-2023-39967 Full read and controlled SSRF through URL parameter when testing a request inside wiremock-studio

2023-09-0620:40:43
CWE-918
GitHub_M
github.com
cve-2023-39967
ssrf
wiremock studio
http
discontinued product

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

7

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

WireMock is a tool for mocking HTTP services. When certain request URLs like “@127.0.0.1:1234" are used in WireMock Studio configuration fields, the request might be forwarded to an arbitrary service reachable from WireMock’s instance. There are 3 identified potential attack vectors: via “TestRequester” functionality, webhooks and the proxy mode. As we can control HTTP Method, HTTP Headers, HTTP Data, it allows sending requests with the default level of credentials for the WireMock instance. The vendor has discontinued the affected Wiremock studio product and there will be no fix. Users are advised to find alternatives.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:wiremock:wiremock:*:*:*:*:*:*:*:*"
    ],
    "vendor": "wiremock",
    "product": "wiremock",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

7

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-39967