Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7w8v-5fcq-pvqw

Опубликовано: 19 окт. 2023
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Apache Shenyu Server Side Request Forgery vulnerability

There exists an SSRF (Server-Side Request Forgery) vulnerability located at the /sandbox/proxyGateway endpoint. This vulnerability allows us to manipulate arbitrary requests and retrieve corresponding responses by inputting any URL into the requestUrl parameter.

Of particular concern is our ability to exert control over the HTTP method, cookies, IP address, and headers. This effectively grants us the capability to dispatch complete HTTP requests to hosts of our choosing.

This issue affects Apache ShenYu: 2.5.1.

Upgrade to Apache ShenYu 2.6.0 or apply patch  https://github.com/apache/shenyu/pull/4776  .

Пакеты

Наименование

org.apache.shenyu:shenyu-admin

maven
Затронутые версииВерсия исправления

< 2.6.0

2.6.0

Наименование

org.apache.shenyu:shenyu-common

maven
Затронутые версииВерсия исправления

< 2.6.0

2.6.0

EPSS

Процентиль: 73%
0.00746
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 6.5
nvd
больше 2 лет назад

There exists an SSRF (Server-Side Request Forgery) vulnerability located at the /sandbox/proxyGateway endpoint. This vulnerability allows us to manipulate arbitrary requests and retrieve corresponding responses by inputting any URL into the requestUrl parameter. Of particular concern is our ability to exert control over the HTTP method, cookies, IP address, and headers. This effectively grants us the capability to dispatch complete HTTP requests to hosts of our choosing. This issue affects Apache ShenYu: 2.5.1. Upgrade to Apache ShenYu 2.6.0 or apply patch  https://github.com/apache/shenyu/pull/4776  .

EPSS

Процентиль: 73%
0.00746
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-918