
Cloud Vulnerability DB
A community-led vulnerabilities database
A Server-Side Request Forgery (SSRF) vulnerability was discovered in rymcu forest version 0.02, identified as CVE-2023-51804. The vulnerability allows remote attackers to obtain sensitive information by manipulating the HTTP body URL parameter in the com.rymcu.forest.web.api.common.UploadController file. This vulnerability was disclosed on January 12, 2024 (NVD).
The vulnerability exists in the UploadController.java component where the application fails to properly validate or restrict user-supplied URLs in the request parameters. The CVSS v3.1 base score for this vulnerability is 7.5 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating a high severity issue with network accessibility and no required privileges or user interaction (NVD).
The vulnerability allows attackers to access and obtain sensitive information from the target system. By manipulating the URL parameter in HTTP requests, attackers can potentially access internal network resources and exfiltrate sensitive data (GitHub Issue).
Security researchers recommend implementing strict input validation and filtering for all user-supplied URLs, including validating URL formats and protocols. A whitelist mechanism should be implemented to restrict access to only specific trusted domain names or IP addresses. Additionally, the application should avoid dynamically constructing URLs from user-controlled input (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."