CVE-2024-31991

Mealie is a self hosted recipe manager and meal planner. Prior to 1.4.0, the safe_scrape_html function utilizes a user-controlled URL to issue a request to a remote server. Based on the content of the response, it will either parse the content or disregard it. This function, nor those that call it, add any restrictions on the URL that can be provided, nor is it restricted to being an FQDN (i.e., an IP address can be provided). As this function’s return will be handled differently by its caller depending on the response, it is possible for an attacker to use this functionality to positively identify HTTP(s) servers on the local network with any IP/port combination. This issue can result in any authenticated user being able to map HTTP servers on a local network that the Mealie service has access to. Note that by default any user can create an account on a Mealie server, and that the default changeme@example.com user is available with its hard-coded password. This vulnerability is fixed in 1.4.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mealie:mealie:*:*:*:*:*:*:*:*

History

07 Mar 2025, 12:36

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.5
First Time Mealie
Mealie mealie
CPE cpe:2.3:a:mealie:mealie:*:*:*:*:*:*:*:*
References () https://github.com/mealie-recipes/mealie/commit/2a3463b7466bc297aede50046da9550d919ec56f - () https://github.com/mealie-recipes/mealie/commit/2a3463b7466bc297aede50046da9550d919ec56f - Patch
References () https://github.com/mealie-recipes/mealie/pull/3368 - () https://github.com/mealie-recipes/mealie/pull/3368 - Issue Tracking
References () https://github.com/mealie-recipes/mealie/blob/mealie-next/mealie/services/scraper/scraper_strategies.py#L27-L70 - () https://github.com/mealie-recipes/mealie/blob/mealie-next/mealie/services/scraper/scraper_strategies.py#L27-L70 - Product
References () https://securitylab.github.com/advisories/GHSL-2023-225_GHSL-2023-226_Mealie/ - () https://securitylab.github.com/advisories/GHSL-2023-225_GHSL-2023-226_Mealie/ - Third Party Advisory
CWE NVD-CWE-noinfo

19 Apr 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-19 21:15

Updated : 2025-03-07 12:36


NVD link : CVE-2024-31991

Mitre link : CVE-2024-31991


JSON object : View

Products Affected

mealie

  • mealie