7.5
CVSSv2

CVE-2019-16948

Published: 13/11/2019 Updated: 18/11/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An SSRF issue exists in Enghouse Web Chat 6.1.300.31. In any POST request, one can replace the port number at WebServiceLocation=localhost:8085/UCWebServices/ with a range of ports to determine what is visible on the internal network (as opposed to what general web traffic would see on the product's host). The response from open ports is different than from closed ports. The product does not allow one to change the protocol: anything except http(s) will throw an error; however, it is the type of error that allows one to determine if a port is open or not.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

enghouse web chat 6.1.300.31