A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.
History

Thu, 13 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Openlibraryfoundation
Openlibraryfoundation vufind
CPEs cpe:2.3:a:openlibraryfoundation:vufind:*:*:*:*:*:*:*:*
Vendors & Products Openlibraryfoundation
Openlibraryfoundation vufind
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 22 Aug 2024 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-05-22T18:56:47.568Z

Updated: 2025-02-13T15:47:12.407Z

Reserved: 2024-02-11T00:00:00.000Z

Link: CVE-2024-25738

cve-icon Vulnrichment

Updated: 2024-08-01T23:52:05.977Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-22T19:15:08.807

Modified: 2024-11-21T09:01:18.627

Link: CVE-2024-25738

cve-icon Redhat

No data.