A significant vulnerability in the Perforce Akana Community Manager Developer Portal has been found, allowing attackers to conduct server-side request forgery (SSRF) attacks.
Community Manager is an advanced solution designed to assist businesses in creating an API portal that will draw in, manage, and assist developers who create applications using their APIs.
Organizations frequently use this software to create and maintain developer portals for their APIs.
Typically, an SSRF attack involves the attacker forcing the server to connect to internal services only found in the infrastructure of the company.
Free Webinar | Mastering WAAP/WAF ROI Analysis | Book Your Spot
In different circumstances, they might be able to force the server to establish a connection with any random external systems.
Sensitive information, such as authorization credentials, can leak as a result.
This critical severity vulnerability tracked as CVE-2024-2796, has a CVSS base score of 9.3. The vulnerability was disclosed by Jakob Antonsson.
The Akana Community Manager Developer Portal, versions 2022.1.3 and earlier, has a server-side request forgery (SSRF) vulnerability.
When an SSRF attack is successful, the hacker can control the target web server to carry out harmful operations or disclose private data.
This approach can cause significant damage to an organization, including sensitive data exposure, cross-site port attacks (XSPA), denial of service (DoS), and remote code execution.
It has been confirmed that the following Perforce Akana Community Manager Developer Portal versions are impacted:
It is highly recommended that organizations utilizing the Akana Community Manager Developer Portal update to one of the patched versions right away.
Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP
The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns. …
INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase widely…
Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT," which…
A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has brought…
Recent research has linked a series of cyberattacks to The Mask group, as one notable…
RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary protocol…