5.5
CVE-2024-31229
- EPSS 0.15%
- Veröffentlicht 18.04.2024 11:15:37
- Zuletzt bearbeitet 21.11.2024 09:13:05
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
Really Simple SSL <= 7.2.3 - Authenticated (Admin+) Server-Side Request Forgery
Server-Side Request Forgery (SSRF) vulnerability in Really Simple Plugins Really Simple SSL.This issue affects Really Simple SSL: from n/a through 7.2.3.
Mögliche Gegenmaßnahme
Really Simple Security – Simple and Performant Security (formerly Really Simple SSL): Update to version 8.0.0, or a newer patched version
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Really Simple Security – Simple and Performant Security (formerly Really Simple SSL)
Version
*-7.2.3
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellerreally-simple-plugins
≫
Produkt
complianz
Default Statusunknown
Version
-
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.15% | 0.36 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| audit@patchstack.com | 5.5 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
|
CWE-918 Server-Side Request Forgery (SSRF)
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.