It is possible to induce the application's server into making requests to an arbitrary domain.
- Obtain usable credentials at the API Connect endpoint.
- Read, write and delete user and system data.
- Browse any path registered in the system, in the context of Apache Camel.
- Consume HTTP, FTP, or any valid Apache Camel protocol-component services.
- Obtain information from the network adjacent to the server, or its Public IP.
- Obtain a token from any user, by modifying the clientIP field.
- Evade control mechanisms against automated attacks, such as CAPTCHA and OTP (dynamic key).
- Write files to the server, and identify its operating system.
The system must avoid that the information query from the server be controlled by users. If this is necessary, the system must restrict the endpoints accepted for query.
Unauthorized attacker from the Internet.
⌚ 120 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.