CVE-2026-33407
🔴 Łataj teraz
Brak walidacji zmiennych HTTP_PROXY i HTTPS_PROXY w Wallos umożliwia atak SSRF.
CVSS
9.1
EPSS
0.0%
Exploit
poc
Vendor
wallosapp
Opis źródłowy (NVD)
Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, Wallos endpoints/logos/search.php accepts HTTP_PROXY and HTTPS_PROXY environment variables without validation, enabling SSRF via proxy hijacking. The server performs DNS resolution on user-supplied search terms, which can be controlled by attackers to trigger outbound requests to arbitrary domains. This issue has been patched in version 4.7.0.
exploit ssrf
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-03-24 18:16:11 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-26 20:54:06 UTC |
Referencje
- https://github.com/ellite/Wallos/commit/e87387f0ebb540cd33e6dfda7181db9db650ecef#diff-d77202c5d47a3d7d4586e519f6f5e256da5fb2969fa8b9c75c399b2821e9de40 (security-advisories@github.com) [Patch]
- https://github.com/ellite/Wallos/security/advisories/GHSA-hhjq-82f8-m6rc (security-advisories@github.com) [Exploit, Vendor Advisory]