Home

Description

Ateme TITAN File 3.9.12.4 contains an authenticated server-side request forgery vulnerability in the job callback URL parameter that allows attackers to bypass network restrictions. Attackers can exploit the unvalidated parameter to initiate file, service, and network enumeration by forcing the application to make HTTP, DNS, or file requests to arbitrary destinations.

PUBLISHED Reserved 2025-12-15 | Published 2025-12-15 | Updated 2025-12-15 | Assigner VulnCheck




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

Server-Side Request Forgery (SSRF)

Product status

3.9.12.4
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5781.php exploit

www.exploit-db.com/exploits/51582 (ExploitDB-51582) exploit

www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5781.php (Zero Science Lab Disclosure (ZSL-2023-5781)) third-party-advisory

www.ateme.com/product-titan-software/ (Ateme Titan Product Webpage) product

www.vulncheck.com/...rver-side-request-forgery-vulnerability (VulnCheck Advisory: Ateme TITAN File 3.9 Authenticated Server-Side Request Forgery Vulnerability) third-party-advisory

cve.org (CVE-2023-53893)

nvd.nist.gov (CVE-2023-53893)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.