top of page
perceptive_background_267k.jpg

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1754 and below contain an unauthenticated SSRF vulnerability…

Published:

22 January 2026 at 23:00:00

Alert date:

23 January 2026 at 02:00:55

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Network Infrastructure

FOG Project, an open-source cloning/imaging/rescue suite and inventory management system, contains an unauthenticated Server-Side Request Forgery (SSRF) vulnerability in versions 1.5.10.1754 and below. The vulnerability exists in getversion.php and can be triggered through a user-controlled URL parameter. Attackers can exploit this to fetch internal websites and files on the machine running FOG. The vulnerability is accessible without authentication when the request includes newService=1. No fixed release version is available at the time of publication, making this a critical security concern for organizations using affected FOG versions.

Technical details

Mitigation steps:

Affected products:

FOG Project

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page