OpenBMCS 2.4 contains an unauthenticated SSRF vulnerability that allows attackers to bypass firewalls and initiate service and network enumeration on the internal network through the affected application, allowing hijacking of current sessions. Attackers can specify an external domain in the 'ip' parameter to force the application to make an HTTP request to an arbitrary destination host.
History

Wed, 10 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Openbmcs
Openbmcs openbmcs
Vendors & Products Openbmcs
Openbmcs openbmcs

Tue, 09 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
Description OpenBMCS 2.4 contains an unauthenticated SSRF vulnerability that allows attackers to bypass firewalls and initiate service and network enumeration on the internal network through the affected application, allowing hijacking of current sessions. Attackers can specify an external domain in the 'ip' parameter to force the application to make an HTTP request to an arbitrary destination host.
Title OpenBMCS Server Side Request Forgery (SSRF) via /php/query.php
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-12-09T20:36:20.265Z

Updated: 2025-12-09T21:33:01.529Z

Reserved: 2025-12-05T19:10:29.045Z

Link: CVE-2021-47703

cve-icon Vulnrichment

Updated: 2025-12-09T21:32:57.344Z

cve-icon NVD

Status : Received

Published: 2025-12-09T21:15:49.050

Modified: 2025-12-09T21:15:49.050

Link: CVE-2021-47703

cve-icon Redhat

No data.