SparkShop <=1.1.7 is vulnerable to server-side request forgery (SSRF). This vulnerability allows attacks to scan ports on the Intranet or local network where the server resides, attack applications running on the Intranet or local network, or read metadata on the cloud server.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://gitee.com/sparkshop/sparkshop | Product |
https://gist.github.com/RMAX2000/ebb654016e5b8a5b55aa6d8a7f2f321a#file-cve-2024-48107 | Third Party Advisory |
Configurations
History
18 Apr 2025, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitee.com/sparkshop/sparkshop - Product | |
References | () https://gist.github.com/RMAX2000/ebb654016e5b8a5b55aa6d8a7f2f321a#file-cve-2024-48107 - Third Party Advisory | |
First Time |
Sparkshop
Sparkshop sparkshop |
|
CPE | cpe:2.3:a:sparkshop:sparkshop:*:*:*:*:*:*:*:* |
28 Oct 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-28 21:15
Updated : 2025-04-18 01:19
NVD link : CVE-2024-48107
Mitre link : CVE-2024-48107
JSON object : View
Products Affected
sparkshop
- sparkshop
CWE
No CWE.