HIGHCVE-2026-24138CVSS 7.5

FOG 易受未经身份验证的 SSRF 漏洞影响,通过 `/fog/service/getversion.php`

平台

php

组件

fogproject

修复版本

1.5.11

AI Confidence: highNVDEPSS 0.0%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2026-24138 describes a Server-Side Request Forgery (SSRF) vulnerability discovered in FOGProject, a free open-source cloning/imaging/rescue suite. This vulnerability allows an unauthenticated attacker to potentially access internal resources and files on the server running FOG. The vulnerability affects versions of FOGProject up to 1.5.10.1754, and a fix is available in version 1.5.11.

影响与攻击场景翻译中…

The SSRF vulnerability in FOGProject's getversion.php allows an attacker to craft a malicious URL parameter that triggers the server to make requests to arbitrary internal or external resources. Because the vulnerability is unauthenticated, an attacker does not need valid credentials to exploit it. This could lead to the exposure of sensitive internal data, such as configuration files, database credentials, or even access to other internal services. The newService=1 parameter appears to be a key component in triggering the vulnerability, bypassing authentication checks. Successful exploitation could allow an attacker to map the internal network and identify other potential targets for further attacks.

利用背景翻译中…

CVE-2026-24138 was publicly disclosed on 2026-01-23. There is no indication of active exploitation at this time, and no public proof-of-concept (POC) code has been released. The vulnerability is not currently listed on the CISA KEV catalog. The relatively recent disclosure suggests a low to medium probability of exploitation, but continuous monitoring is recommended.

哪些人处于风险中翻译中…

Organizations utilizing FOGProject for imaging, cloning, and inventory management are at risk, particularly those running versions prior to 1.5.11. Shared hosting environments where FOGProject is deployed could be especially vulnerable, as an attacker gaining access to one instance could potentially exploit the SSRF vulnerability to access other hosted resources.

检测步骤翻译中…

• linux / server:

journalctl -u fogproject | grep -i "getversion.php"

• generic web:

curl -I http://<fogproject_server>/getversion.php?newService=1&url=<arbitrary_url>

Check the response headers for unexpected redirects or connections to internal resources. • php: Review the getversion.php file for any modifications or suspicious code related to URL handling.

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.01% (3% 百分位)

CISA SSVC

利用情况poc
可自动化no
技术影响partial

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N7.5HIGHAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityNone数据未授权篡改风险AvailabilityNone服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
无 — 无完整性影响。
Availability
无 — 无可用性影响。

受影响的软件

组件fogproject
供应商FOGProject
影响范围修复版本
<= 1.5.10.1754 – <= 1.5.10.17541.5.11

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2026-24138 is to upgrade FOGProject to version 1.5.11 or later, which contains the fix. If upgrading immediately is not possible, consider implementing a Web Application Firewall (WAF) rule to block requests to getversion.php with suspicious URL parameters, specifically those containing user-controlled URLs. Additionally, restrict network access to the FOGProject server to only necessary IP addresses and ports. Monitor FOGProject logs for unusual outbound requests originating from getversion.php. After upgrading, confirm the fix by attempting to trigger the SSRF vulnerability with a known malicious URL and verifying that the request is blocked.

修复方法

在可用时,将 FOG 更新到 1.5.10.1754 之后的版本。由于在发布时没有固定的版本,请监控 FOG 项目以获取安全更新,并在可用时尽快应用。考虑实施临时缓解措施,例如如果可能,限制对 `/fog/service/getversion.php` 的访问,直到发布修复版本。

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2026-24138 — SSRF in FOGProject?

CVE-2026-24138 is a Server-Side Request Forgery (SSRF) vulnerability affecting FOGProject versions up to 1.5.10.1754, allowing unauthenticated access to internal resources.

Am I affected by CVE-2026-24138 in FOGProject?

You are affected if you are running FOGProject version 1.5.10.1754 or earlier. Upgrade to version 1.5.11 or later to mitigate the risk.

How do I fix CVE-2026-24138 in FOGProject?

Upgrade FOGProject to version 1.5.11 or later. As a temporary workaround, implement a WAF rule to block suspicious requests to getversion.php.

Is CVE-2026-24138 being actively exploited?

There is currently no evidence of active exploitation, but continuous monitoring is recommended.

Where can I find the official FOGProject advisory for CVE-2026-24138?

Refer to the FOGProject website and security advisories for the latest information: [https://fogproject.org/](https://fogproject.org/)

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。