Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hfwx-c7q6-g54c

Опубликовано: 12 мар. 2021
Источник: github
Github: Прошло ревью

Описание

Vulnerability allowing for reading internal HTTP resources

Impact

The vulnerability allows for reading and outputting files served by other services on the internal network in which the export server is hosted. If the export server is exposed to the internet, this potentially allows a malicious user to gain read access to internal web-resources.

The impact is limited to internal services that serve content via. HTTP(S), and requires the attacker to know internal hostnames/IP addresses.

The previous versions have been marked as deprecated on NPM.

Patches

Version 2.1.0 released alongside this security advisory addresses the issue. Please note that this release is not backwards compatible out of the box. See the changelog for details.

Additionally, it's also recommended to upgrade to the latest version of Highcharts to get the added input sanitation implemented in version 9.0 and later.

Workarounds

There are no known workarounds to the issue - an upgrade to version 2.1.0 is required.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

highcharts-export-server

npm
Затронутые версииВерсия исправления

<= 2.0.30

2.1.0

Дефекты

CWE-552

Дефекты

CWE-552