Rebuild v3.7.7 was discovered to contain a Server-Side Request Forgery (SSRF) via the type parameter in the com.rebuild.web.admin.rbstore.RBStoreController#loadDataIndex method.
References
Link | Resource |
---|---|
https://github.com/RacerZ-fighting/CVE-vulns/blob/main/rebuild%203.7.7.md | Exploit Third Party Advisory |
https://github.com/RacerZ-fighting/rebuild-vulns/blob/main/rebuild%203.7.7.md | Exploit Third Party Advisory |
Configurations
History
12 Sep 2025, 20:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/RacerZ-fighting/CVE-vulns/blob/main/rebuild%203.7.7.md - Exploit, Third Party Advisory | |
References | () https://github.com/RacerZ-fighting/rebuild-vulns/blob/main/rebuild%203.7.7.md - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:getrebuild:rebuild:*:*:*:*:*:*:*:* | |
First Time |
Getrebuild
Getrebuild rebuild |
26 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-918 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.1 |
25 Aug 2025, 20:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-25 15:15
Updated : 2025-09-12 20:19
NVD link : CVE-2024-46413
Mitre link : CVE-2024-46413
CVE.ORG link : CVE-2024-46413
JSON object : View
Products Affected
getrebuild
- rebuild
CWE
CWE-918
Server-Side Request Forgery (SSRF)