Description
mosparo is the modern solution to protect your online forms from spam. Prior to 1.4.13, the automatic rule package source URL feature allows a project member with the editor role to store an attacker-controlled URL that the server later fetches. Because the server follows http/https redirects and does not restrict private or loopback destinations, this becomes a stored SSRF primitive that can be turned into an internal HTTP probing oracle. This vulnerability is fixed in 1.4.13.
Problem types
CWE-918: Server-Side Request Forgery (SSRF)
Product status
References
github.com/...osparo/security/advisories/GHSA-92fh-26qf-r8rg
github.com/...osparo/security/advisories/GHSA-92fh-26qf-r8rg