{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T08:58:09.147","vulnerabilities":[{"cve":{"id":"CVE-2024-41668","sourceIdentifier":"security-advisories@github.com","published":"2024-07-23T19:15:13.437","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The cBioPortal for Cancer Genomics provides visualization, analysis, and download of large-scale cancer genomics data sets. When running a publicly exposed proxy endpoint without authentication, cBioPortal could allow someone to perform a Server Side Request Forgery (SSRF) attack. Logged in users could do the same on private instances. A fix has been released in version 6.0.12. As a workaround, one might be able to disable `/proxy` endpoint entirely via, for example, nginx."},{"lang":"es","value":"El cBioPortal for Cancer Genomics proporciona visualización, análisis y descarga de conjuntos de datos de genómica del cáncer a gran escala. Al ejecutar un endpoint proxy expuesto públicamente sin autenticación, cBioPortal podría permitir que alguien realice un ataque de Server Side Request Forgery (SSRF). Los usuarios que hayan iniciado sesión podrían hacer lo mismo en instancias privadas. Se ha publicado una solución en la versión 6.0.12. Como workaround, se podría deshabilitar completamente el endpoint `/proxy` mediante, por ejemplo, nginx."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-918"}]}],"references":[{"url":"https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5","source":"security-advisories@github.com"},{"url":"https://github.com/cBioPortal/cbioportal/pull/10884","source":"security-advisories@github.com"},{"url":"https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12","source":"security-advisories@github.com"},{"url":"https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm","source":"security-advisories@github.com"},{"url":"https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004","source":"security-advisories@github.com"},{"url":"https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/cBioPortal/cbioportal/pull/10884","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}