ghsa-p72p-rjr2-r439
Vulnerability from github
Published
2019-05-29 20:24
Modified
2020-08-31 18:35
VLAI Severity ?
Summary
Server-Side Request Forgery in terriajs-server
Details
Versions of terriajs-serverprior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-server proxy to access any HTTP-accessible resources that are accessible to the server, including private resources in the hosting environment.
Recommendation
Upgrade to version 2.7.4 or later.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "terriajs-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-918"
],
"github_reviewed": true,
"github_reviewed_at": "2019-05-29T20:23:25Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "Versions of `terriajs-server`prior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-server proxy to access any HTTP-accessible resources that are accessible to the server, including private resources in the hosting environment.\n\n\n## Recommendation\n\nUpgrade to version 2.7.4 or later.",
"id": "GHSA-p72p-rjr2-r439",
"modified": "2020-08-31T18:35:03Z",
"published": "2019-05-29T20:24:02Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0"
},
{
"type": "WEB",
"url": "https://medium.com/terria/security-vulnerability-in-terriajs-server-82c8bf4da0a5"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/768"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Server-Side Request Forgery in terriajs-server"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…