Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Server-Side Request Forgery (SSRF) in emissary:emissary
Vulnerability Description
Emissary is a P2P-based, data-driven workflow engine. Emissary version 6.4.0 is vulnerable to Server-Side Request Forgery (SSRF). In particular, the `RegisterPeerAction` endpoint and the `AddChildDirectoryAction` endpoint are vulnerable to SSRF. This vulnerability may lead to credential leaks. Emissary version 7.0 contains a patch. As a workaround, disable network access to Emissary from untrusted sources.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
Emissary 代码问题漏洞
Vulnerability Description
Emissary是一个应用软件。一个基于P2P的数据驱动的工作流引擎,可在异构的可能广泛分布的多层P2P网络计算资源中运行。 Emissary 6.4.0存在安全漏洞,该漏洞源于RegisterPeerAction 端点和 AddChildDirectoryAction 端点容易受到 SSRF 的攻击。
CVSS Information
N/A
Vulnerability Type
N/A