Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2023-24623
Paranoidhttp before 0.3.0 allows SSRF because [::] is equivalent to the 127.0.0.1 address, but does not match the filter for private addresses.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.001
EPSS Ranking
19.2%
CVSS Severity
CVSS v3 Score
7.5
References
https://github.com/hakobe/paranoidhttp/blob/master/CHANGELOG.md#v030-2023-01-19
https://github.com/hakobe/paranoidhttp/commit/07f671da14ce63a80f4e52432b32e8d178d75fd3
https://github.com/hakobe/paranoidhttp/compare/v0.2.0...v0.3.0
https://github.com/hakobe/paranoidhttp/blob/master/CHANGELOG.md#v030-2023-01-19
https://github.com/hakobe/paranoidhttp/commit/07f671da14ce63a80f4e52432b32e8d178d75fd3
https://github.com/hakobe/paranoidhttp/compare/v0.2.0...v0.3.0
Products affected by CVE-2023-24623
Paranoidhttp Project
»
Paranoidhttp
»
Version:
N/A
cpe:2.3:a:paranoidhttp_project:paranoidhttp:-
Paranoidhttp Project
»
Paranoidhttp
»
Version:
0.1.0
cpe:2.3:a:paranoidhttp_project:paranoidhttp:0.1.0
Paranoidhttp Project
»
Paranoidhttp
»
Version:
0.2.0
cpe:2.3:a:paranoidhttp_project:paranoidhttp:0.2.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved