405
VMScore

CVE-2019-7652

Published: 09/05/2019 Updated: 13/05/2019
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 7.7 | Impact Score: 4 | Exploitability Score: 3.1
VMScore: 405
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

TheHive Project UnshortenLink analyzer prior to 1.1, included in Cortex-Analyzers prior to 1.15.2, has SSRF. To exploit the vulnerability, an attacker must create a new analysis, select URL for Data Type, and provide an SSRF payload like "127.0.0.1:22" in the Data parameter. The result can be seen in the main dashboard. Thus, it is possible to do port scans on localhost and intranet hosts.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

thehive-project cortex-analyzers

Exploits

# Exploit Title: SSRF in TheHive Project Cortex <= 213 # Date: 2/26/2019 # Exploit Author: Alexandre Basquin # Vendor Homepage: blogthehive-projectorg # Software Link: githubcom/TheHive-Project/Cortex # Version: Cortex <= 213 # Tested on: 213 # CVE : CVE-2019-7652 # Exploit description TheHive Project Cortex version ...
TheHive Project Cortex versions 213 and below suffer from a server-side request forgery vulnerability ...