Server-Side Request Forgery (SSRF) Affecting io.hawt:hawtio-system package, versions [,2.5.0)
Snyk CVSS
Attack Complexity
High
Confidentiality
High
Threat Intelligence
EPSS
3.28% (92nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-IOHAWT-451543
- published 3 Jul 2019
- disclosed 3 Jul 2019
- credit CipherTechs Inc
Introduced: 3 Jul 2019
CVE-2019-9827 Open this link in a new tabHow to fix?
Upgrade io.hawt:hawtio-system
to version 2.5.0 or higher.
Overview
io.hawt:hawtio-system is a hawtio package for creating a Java modular web console.
Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF). It is possible for remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial /proxy/
substring of a URI.