Description
A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.
INFO
Published Date :
2024-05-22T18:56:47.568Z
Last Modified :
2025-02-13T15:47:12.407Z
Source :
mitre
AFFECTED PRODUCTS
The following products are affected by CVE-2024-25738 vulnerability.
| Vendors | Products |
|---|---|
| Openlibraryfoundation |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-25738.
| URL | Resource |
|---|---|
| https://vufind.org/wiki/security:cve-2024-25738 |
|