VulnerAlert



CLOUD
16-12-2025 16:51

CVE-2025-66407 Vulnerabilidad documentada

Sin puntuación
Tags
#data
#web
#source
#server
#git
#form
#diff
#config
#add
#cloud
#application
#/git(.*)config/iU
#git config
#affected
#arbitrary
#ssrf
#server-side request forgery
#error
#dangerous
#compromise
#allow
#attack
#access
#affect
Descripción
Weblate is a web based localization tool. The Create Component functionality in Weblate allows authorized users to add new translation components by specifying both version control system and source code repository URL pull from. However, prior 5.15, the field not validated or sanitized, allowing an attacker supply arbitrary protocols, hostnames, IP addresses, including localhost, internal network local filenames. When Mercurial selected, exposes full server-side HTTP response for provided URL. This effectively creates request forgery (SSRF) primitive that can probe services return their contents. In addition accessing endpoints, behavior also enables file enumeration attempting file:// requests. While contents may always be returned, application’s error messages clearly differentiate between files exist do not, revealing information about server’s filesystem layout. cloud environments, this particularly dangerous, as internal-only endpoints such metadata accessible, potentially leading credential disclosure environment compromise. has been addressed 5.15 release. As workaround, remove from `VCS_BACKENDS`; Git backend affected. was already configured block protocol does expose content message.
https://github.com/WeblateOrg/weblate/pull/17102
https://github.com/WeblateOrg/weblate/pull/17103
https://github.com/WeblateOrg/weblate/security/advisories/GHSA-hfpv-mc5v-p9mm
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2025-66407
Resultados similares
Coincidentes en almenos en 50% de los tags
17-12-2025
Amazon: Ongoing cryptomining campaign uses hacked AWS accounts Amazon\'s AWS GuardDuty security...
Ver información
17-12-2025
Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Ma...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por