{"uuid": "6630cfc7-bbd0-43d5-a576-734339f89da9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-44313", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4339", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-44313\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Server-Side Request Forgery (SSRF) vulnerability in Apache ServiceComb Service-Center. Attackers can obtain sensitive server information through specially crafted requests.This issue affects Apache ServiceComb before 2.1.0 (included). Users are recommended to upgrade to version 2.2.0, which fixes the issue.\n\ud83d\udccf Published: 2024-01-31T09:30:18Z\n\ud83d\udccf Modified: 2025-02-13T19:32:39Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-44313\n2. https://github.com/apache/servicecomb-service-center\n3. https://lists.apache.org/thread/kxovd455o9h4f2v811hcov2qknbwld5r\n4. http://www.openwall.com/lists/oss-security/2024/01/31/4", "creation_timestamp": "2025-02-13T20:14:38.000000Z"}