CVE-2024-31993

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-31993
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-31993.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-31993
Published
2024-04-19T21:15:08Z
Modified
2025-01-08T16:01:34.458679Z
Summary
[none]
Details

Mealie is a self hosted recipe manager and meal planner. Prior to 1.4.0, the scrape_image function will retrieve an image based on a user-provided URL, however the provided URL is not validated to point to an external location and does not have any enforced rate limiting. The response from the Mealie server will also vary depending on whether or not the target file is an image, is not an image, or does not exist. Additionally, when a file is retrieved the file may remain stored on Mealie’s file system as original.jpg under the UUID of the recipe it was requested for. If the attacker has access to an admin account (e.g. the default changeme@example.com), this file can then be retrieved. Note that if Mealie is running in a development setting this could be leveraged by an attacker to retrieve any file that the Mealie server had downloaded in this fashion without the need for administrator access. This vulnerability is fixed in 1.4.0.

References

Affected packages

Git / github.com/mealie-recipes/mealie

Affected ranges

Type
GIT
Repo
https://github.com/mealie-recipes/mealie
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v0.*

v0.0.1
v0.0.2
v0.1.0
v0.2.0
v0.2.1
v0.2.2
v0.3.0
v0.4.0
v0.4.1
v0.4.1a
v0.4.2
v0.4.3

v1.*

v1.0.0
v1.0.0-RC1
v1.0.0-RC1.1
v1.0.0-RC2
v1.0.0-beta-1
v1.0.0beta-2
v1.0.0beta-3
v1.0.0beta-4
v1.0.0beta-5
v1.1.0
v1.1.1
v1.2.0
v1.3.0
v1.3.1
v1.3.2