Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rmxg-6qqf-x8mr

Опубликовано: 21 нояб. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

GeoNode Server Side Request forgery

Summary

A server side request forgery vuln was found within geonode when testing on a bug bounty program. Server side request forgery allows a user to request information on the internal service/services.

Details

The endpoint /proxy/?url= does not properly protect against SSRF. when using the following format you can request internal hosts and display data. /proxy/?url=http://169.254.169.254\@whitelistedIPhere. This will state wether the AWS internal IP is alive. If you get a 404, the host is alive. A non alive host will not display a response. To display metadata, use a hashfrag on the url /proxy/?url=http://169.254.169.254\@#whitelisteddomain.com or try /proxy/?url=http://169.254.169.254\@%23whitelisteddomain.com

Impact

Port scan internal hosts, and request information from internal hosts.

Пакеты

Наименование

geonode

pip
Затронутые версииВерсия исправления

>= 3.2.0, < 4.2.0

4.2.0

EPSS

Процентиль: 25%
0.00085
Низкий

7.5 High

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 7.5
nvd
больше 2 лет назад

GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. In versions 3.2.0 through 4.1.2, the endpoint `/proxy/?url=` does not properly protect against server-side request forgery. This allows an attacker to port scan internal hosts and request information from internal hosts. A patch is available at commit a9eebae80cb362009660a1fd49e105e7cdb499b9.

EPSS

Процентиль: 25%
0.00085
Низкий

7.5 High

CVSS3

Дефекты

CWE-918