Description
Ateme TITAN File 3.9.12.4 contains an authenticated server-side request forgery vulnerability in the job callback URL parameter that allows attackers to bypass network restrictions. Attackers can exploit the unvalidated parameter to initiate file, service, and network enumeration by forcing the application to make HTTP, DNS, or file requests to arbitrary destinations.
Problem types
Server-Side Request Forgery (SSRF)
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5781.php
www.exploit-db.com/exploits/51582 (ExploitDB-51582)
www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5781.php (Zero Science Lab Disclosure (ZSL-2023-5781))
www.ateme.com/product-titan-software/ (Ateme Titan Product Webpage)
www.vulncheck.com/...rver-side-request-forgery-vulnerability (VulnCheck Advisory: Ateme TITAN File 3.9 Authenticated Server-Side Request Forgery Vulnerability)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.