A vulnerability was found in donglight bookstore电商书城系统说明 1.0.0. It has been classified as critical. This affects the function getHtml of the file src/main/java/org/zdd/bookstore/rawl/HttpUtil.java. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/donglight/bookstore/issues/11 | Exploit Issue Tracking |
| https://github.com/donglight/bookstore/issues/11#issue-2760929273 | Exploit Issue Tracking |
| https://vuldb.com/?ctiid.290787 | Permissions Required VDB Entry |
| https://vuldb.com/?id.290787 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.469689 | Third Party Advisory VDB Entry |
| https://github.com/donglight/bookstore/issues/11 | Exploit Issue Tracking |
| https://github.com/donglight/bookstore/issues/11#issue-2760929273 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-01-09 00:15
Updated : 2025-08-22 21:41
NVD link : CVE-2024-13195
Mitre link : CVE-2024-13195
CVE.ORG link : CVE-2024-13195
JSON object : View
Products Affected
donglight
- bookstore
CWE
CWE-918
Server-Side Request Forgery (SSRF)
