Severity
5.5MEDIUMNVD
GHSA9.8
EPSS
0.1%
top 71.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 5
Latest updateFeb 6

Description

Server-side request forgery (SSRF) vulnerability that could allow a rogue server on the local network to modify its URL using another DNS address to point back to the loopback adapter. This could then allow the URL to exploit other vulnerabilities on the local server. This was addressed by fixing DNS addresses that refer to loopback. This issue affects My Cloud OS 5 devices before 5.27.161, My Cloud Home, My Cloud Home Duo and SanDisk ibi devices before 9.5.1-104.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages17 packages

🔴Vulnerability Details

2
GHSA
GHSA-ff78-2q7q-3gpw: Server-side request forgery (SSRF) vulnerability that could allow a rogue server on the local network to modify its URL using another DNS address to p2024-02-06
GHSA
Arbitrary Code Execution in Pillow2024-01-19

📋Vendor Advisories

1
Red Hat
pillow: Arbitrary Code Execution via the environment parameter2024-01-19