First published: Thu Jun 27 2019(Updated: )
Hawt Hawtio through 2.5.0 is vulnerable to SSRF, allowing a remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial /proxy/ substring of a URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Hawtio | <=2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-9827 is classified as a potential medium to high severity vulnerability due to its ability to allow SSRF attacks.
To mitigate CVE-2019-9827, upgrade Hawt Hawtio to version 2.5.1 or later to ensure the vulnerability is patched.
CVE-2019-9827 affects all versions of Hawt Hawtio up to and including version 2.5.0.
CVE-2019-9827 enables Server-Side Request Forgery (SSRF) attacks, allowing attackers to make HTTP requests from the server.
If you cannot update, consider restricting access to the affected server or implementing network controls to limit potential SSRF exploitation from CVE-2019-9827.