First published: Tue Jun 04 2024(Updated: )
LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LyLme Spage | =1.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36675 is classified as a medium severity vulnerability due to its potential for exploiting server-side request forgery.
To fix CVE-2024-36675, upgrade to a patched version of LyLme_spage that addresses the SSRF vulnerability.
The impact of CVE-2024-36675 includes the risk of unauthorized access to internal resources through crafted requests.
No, CVE-2024-36675 specifically affects LyLme_spage version 1.9.5.
You can determine if your application is vulnerable to CVE-2024-36675 by checking if you are using LyLme_spage version 1.9.5 and analyzing the use of the get_head function for SSRF risks.