CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-0510: HaoKeKeJi YiQiNiu Api.php http_post server-side request forgery

7.3 CVSS

Description

A vulnerability, which was classified as critical, has been found in HaoKeKeJi YiQiNiu up to 3.1. Affected by this issue is the function http_post of the file /application/pay/controller/Api.php. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250652. Eine kritische Schwachstelle wurde in HaoKeKeJi YiQiNiu bis 3.1 entdeckt. Dies betrifft die Funktion http_post der Datei /application/pay/controller/Api.php. Mittels Manipulieren des Arguments url mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.

Classification

CVE ID: CVE-2024-0510

CVSS Base Severity: HIGH

CVSS Base Score: 7.3

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Problem Types

CWE-918 Server-Side Request Forgery

Affected Products

Vendor: HaoKeKeJi

Product: YiQiNiu

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.12% (probability of being exploited)

EPSS Percentile: 31.58% (scored less or equal to compared to others)

EPSS Date: 2025-06-12 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: poc

SSVC Technical Impact: partial

SSVC Automatable: true

References

https://nvd.nist.gov/vuln/detail/CVE-2024-0510
https://vuldb.com/?id.250652
https://vuldb.com/?ctiid.250652
https://note.zhaoj.in/share/gBtNhBb39u9u

Timeline