ELOG 3.1.4-57bea22 and below can be used as an HTTP GET request proxy when unauthenticated remote attackers send crafted HTTP POST requests.
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Elog | Elog_project | * | 3.1.4-57bea22 (including) |
Elog | Ubuntu | bionic | * |
Elog | Ubuntu | disco | * |
Elog | Ubuntu | eoan | * |
Elog | Ubuntu | groovy | * |
Elog | Ubuntu | hirsute | * |
Elog | Ubuntu | impish | * |
Elog | Ubuntu | trusty | * |
Elog | Ubuntu | xenial | * |