CVE-2024-48590
Published: 20 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
Inflectra SpiraTeam 7.2.00 is vulnerable to a Server-Side Request Forgery (SSRF) issue, tracked as CVE-2024-48590 and published on 2025-03-20, through its NewsReaderService component. This vulnerability, mapped to CWE-918, carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its high impacts on confidentiality, integrity, and availability.
The vulnerability can be exploited by an unauthenticated attacker over the network with low attack complexity and no user interaction required. Exploitation enables privilege escalation and access to sensitive information, allowing the attacker to compromise the targeted SpiraTeam instance.
Further details, including potential mitigation guidance or patches, are available in the advisory at https://github.com/GCatt-AS/CVE-2024-48590/blob/main/README.md.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
SSRF vulnerability (CVE-2024-48590) in public-facing SpiraTeam application enables exploitation of public-facing application (T1190) for privilege escalation (T1068) and obtaining sensitive information.