A Server-Side Request Forgery (SSRF) vulnerability in the /Upgrade/FixConfig route in Open Library Foundation VuFind 2.0 through 9.1 before 9.1.1 allows a remote attacker to overwrite local configuration files to gain access to the administrator panel and achieve Remote Code Execution. A mitigating factor is that it requires the allow_url_include PHP runtime setting to be on, which is off in default installations. It also requires the /Upgrade route to be exposed, which is exposed by default after installing VuFind, and is recommended to be disabled by setting autoConfigure to false in config.ini.
Published 2024-05-22 19:15:09
Updated 2024-05-24 01:15:31
Source MITRE
View at NVD,   CVE.org
Vulnerability category: Server-side request forgery (SSRF) Execute code

Exploit prediction scoring system (EPSS) score for CVE-2024-25738

We don't have an EPSS score for this CVE yet

References for CVE-2024-25738

Products affected by CVE-2024-25738

The following product & version information is provided by CVEdetails.com. We provide product & version information for most CVEs even if they are not available from NVD.
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!