Description

A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.

INFO

Published Date :

2024-05-22T18:56:47.568Z

Last Modified :

2025-02-13T15:47:12.407Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2024-25738 vulnerability.

Vendors Products
Openlibraryfoundation
  • Vufind
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-25738.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact