Security for everyone

CVE-2024-1021 Scanner

CVE-2024-1021 scanner - Server-Side Request Forgery vulnerability in Rebuild


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




Rebuild is a software utilized for managing HTTP requests and handling server-side operations within web applications. Developed for web administrators and developers, it facilitates the handling of HTTP requests and responses, streamlining server-side functionalities. However, versions up to 3.5.5 are vulnerable to Server-Side Request Forgery (SSRF) attacks, which could potentially lead to unauthorized access to internal resources.

The vulnerability detected in Rebuild <= 3.5.5 pertains to Server-Side Request Forgery (SSRF), allowing attackers to manipulate URL parameters to initiate requests to internal resources. This can result in unauthorized access to sensitive internal systems or data accessible from the affected server.

The vulnerability resides in the URL parameter of the 'readRawText' function of the HTTP Request Handler component in Rebuild <= 3.5.5. Attackers can exploit this by crafting malicious requests containing URLs to internal resources, leading to unauthorized access or data leakage.

Exploiting the Server-Side Request Forgery (SSRF) vulnerability in Rebuild <= 3.5.5 can enable attackers to access sensitive internal resources, potentially compromising confidentiality, integrity, and availability. Attackers may exploit this to perform reconnaissance, exfiltrate data, or launch further attacks from within the affected network.

Safeguard your web applications against Server-Side Request Forgery (SSRF) vulnerabilities like CVE-2024-1021 by leveraging the advanced security scanning capabilities of the securityforeveryone platform. Join our platform to proactively identify and mitigate vulnerabilities, ensuring the robustness and security of your web applications against potential cyber threats.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture