Vulnerability Name: | CVE-2022-1379 (CCN-226755) | ||||||||||||
Assigned: | 2022-04-10 | ||||||||||||
Published: | 2022-04-10 | ||||||||||||
Updated: | 2022-08-06 | ||||||||||||
Summary: | URL Restriction Bypass in GitHub repository plantuml/plantuml prior to V1.2022.5. An attacker can abuse this to bypass URL restrictions that are imposed by the different security profiles and achieve server side request forgery (SSRF). This allows accessing restricted internal resources/servers or sending requests to third party servers. | ||||||||||||
CVSS v3 Severity: | 9.1 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) 8.2 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-918 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-1379 Source: XF Type: UNKNOWN plantuml-cve20221379-ssrf(226755) Source: CCN Type: PlantUML GIT Repository plantuml Source: MISC Type: Patch, Third Party Advisory https://github.com/plantuml/plantuml/commit/93e5964e5f35914f3f7b89de620c596795550083 Source: CONFIRM Type: Exploit, Patch, Third Party Advisory https://huntr.dev/bounties/0d737527-86e1-41d1-9d37-b2de36bc063a Source: CCN Type: huntr Web site URL Restriction Bypass in plantuml/plantuml Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-e6c09a89eb Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-fda9f1f7bd Source: CCN Type: PlantUML Web site PlantUML | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
BACK |