Логотип exploitDog
bind:CVE-2023-48711
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-48711

Количество 3

Количество 3

nvd логотип

CVE-2023-48711

около 2 лет назад

google-translate-api-browser is an npm package which interfaces with the google translate web api. A Server-Side Request Forgery (SSRF) Vulnerability is present in applications utilizing the `google-translate-api-browser` package and exposing the `translateOptions` to the end user. An attacker can set a malicious `tld`, causing the application to return unsafe URLs pointing towards local resources. The `translateOptions.tld` field is not properly sanitized before being placed in the Google translate URL. This can allow an attacker with control over the `translateOptions` to set the `tld` to a payload such as `@127.0.0.1`. This causes the full URL to become `https://translate.google.@127.0.0.1/...`, where `translate.google.` is the username used to connect to localhost. An attacker can send requests within internal networks and the local host. Should any HTTPS application be present on the internal network with a vulnerability exploitable via a GET call, then it would be possible to exp

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-4233-7q5q-m7p6

около 2 лет назад

google-translate-api-browser Server-Side Request Forgery (SSRF) Vulnerability

CVSS3: 3.7
EPSS: Низкий
fstec логотип

BDU:2023-08516

около 2 лет назад

Уязвимость пакета google-translate-api-browser пакетного менеджера NPM, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-48711

google-translate-api-browser is an npm package which interfaces with the google translate web api. A Server-Side Request Forgery (SSRF) Vulnerability is present in applications utilizing the `google-translate-api-browser` package and exposing the `translateOptions` to the end user. An attacker can set a malicious `tld`, causing the application to return unsafe URLs pointing towards local resources. The `translateOptions.tld` field is not properly sanitized before being placed in the Google translate URL. This can allow an attacker with control over the `translateOptions` to set the `tld` to a payload such as `@127.0.0.1`. This causes the full URL to become `https://translate.google.@127.0.0.1/...`, where `translate.google.` is the username used to connect to localhost. An attacker can send requests within internal networks and the local host. Should any HTTPS application be present on the internal network with a vulnerability exploitable via a GET call, then it would be possible to exp

CVSS3: 3.7
0%
Низкий
около 2 лет назад
github логотип
GHSA-4233-7q5q-m7p6

google-translate-api-browser Server-Side Request Forgery (SSRF) Vulnerability

CVSS3: 3.7
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-08516

Уязвимость пакета google-translate-api-browser пакетного менеджера NPM, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 3.7
0%
Низкий
около 2 лет назад

Уязвимостей на страницу