First published: Wed Aug 21 2019(Updated: )
A Server-Side Request Forgery (SSRF) vulnerability in the backup & restore functionality in earlier versions than ProSyst mBS SDK 8.2.6 and Bosch IoT Gateway Software 9.3.0 allows a remote attacker to forge GET requests to arbitrary URLs. In addition, this could potentially allow an attacker to read sensitive zip files from the local server.
Credit: psirt@bosch.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bosch IoT Gateway Software | <9.3.0 | |
Bosch Prosyst Mbs SDK | <8.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11897 is classified as a medium-severity vulnerability due to its potential to allow remote attackers to forge GET requests.
To mitigate CVE-2019-11897, upgrade to Bosch IoT Gateway Software version 9.3.0 or ProSyst mBS SDK version 8.2.6 or later.
CVE-2019-11897 affects Bosch IoT Gateway Software versions earlier than 9.3.0 and Bosch ProSyst mBS SDK versions earlier than 8.2.6.
CVE-2019-11897 is a Server-Side Request Forgery (SSRF) vulnerability.
Yes, CVE-2019-11897 could potentially allow attackers to access internal systems and sensitive information through forged requests.