2 results (0.001 seconds)

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 0

A command injection vulnerability was found in the IndieAuth functionality of the Ruby on Rails based Haven blog web application. The affected functionality requires authentication, but an attacker can craft a link that they can pass to a logged in administrator of the blog software. This leads to the immediate execution of the provided commands when the link is accessed by the authenticated administrator. This issue may lead to Remote Code Execution (RCE) and has been addressed by commit `c52f07c`. Users are advised to upgrade. • https://github.com/havenweb/haven/commit/c52f07c https://github.com/havenweb/haven/security/advisories/GHSA-65cm-7g24-hm9f • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Haven 5d15944 allows Server-Side Request Forgery (SSRF) via the feed[url]= Feeds functionality. Authenticated users with the ability to create new RSS Feeds or add RSS Feeds can supply an arbitrary hostname (or even the hostname of the Haven server itself). NOTE: this product has significant usage but does not have numbered releases; ordinary end users may typically use the master branch. Haven 5d15944 permite Server-Side Request Forgery (SSRF) a través de la funcionalidad feed[url]= Feeds. Los usuarios autenticados con la capacidad de crear nuevos canales RSS o agregar canales RSS pueden proporcionar un nombre de host arbitrario (o incluso el nombre de host del propio servidor Haven). • https://github.com/havenweb/haven/issues/51 https://havenweb.org • CWE-918: Server-Side Request Forgery (SSRF) •