Server-side Request Forgery (SSRF) Affecting dotnetnuke.core package, versions [,9.2.0)
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.75% (81st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DOTNET-DOTNETNUKECORE-60256
- published 19 Jul 2018
- disclosed 3 Jul 2018
- credit Kurt Boberg
How to fix?
Upgrade dotnetnuke.core
to version 9.2.0 or higher.
Overview
dotnetnuke.core
is an open source web application framework.
Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) via the DnnImageHandler class. Attackers may be able to access information about internal network resources.