Логотип exploitDog
bind:CVE-2024-43371
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-43371

Количество 2

Количество 2

nvd логотип

CVE-2024-43371

больше 1 года назад

CKAN is an open-source data management system for powering data hubs and data portals. There are a number of CKAN plugins, including XLoader, DataPusher, Resource proxy and ckanext-archiver, that work by downloading the contents of local or remote files in order to perform some actions with their contents (e.g. pushing to the DataStore, streaming contents or saving a local copy). All of them use the resource URL, and there are currently no checks to limit what URLs can be requested. This means that a malicious (or unaware) user can create a resource with a URL pointing to a place where they should not have access in order for one of the previous tools to retrieve it (known as a Server Side Request Forgery). Users wanting to protect against these kinds of attacks can use one or a combination of the following approaches: (1) Use a separate HTTP proxy like Squid that can be used to allow / disallow IPs, domains etc as needed, and make CKAN extensions aware of this setting via the ckan.dow

CVSS3: 4.5
EPSS: Низкий
github логотип

GHSA-g9ph-j5vj-f8wm

больше 1 года назад

Potential access to sensitive URLs via CKAN extensions (SSRF)

CVSS3: 4.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-43371

CKAN is an open-source data management system for powering data hubs and data portals. There are a number of CKAN plugins, including XLoader, DataPusher, Resource proxy and ckanext-archiver, that work by downloading the contents of local or remote files in order to perform some actions with their contents (e.g. pushing to the DataStore, streaming contents or saving a local copy). All of them use the resource URL, and there are currently no checks to limit what URLs can be requested. This means that a malicious (or unaware) user can create a resource with a URL pointing to a place where they should not have access in order for one of the previous tools to retrieve it (known as a Server Side Request Forgery). Users wanting to protect against these kinds of attacks can use one or a combination of the following approaches: (1) Use a separate HTTP proxy like Squid that can be used to allow / disallow IPs, domains etc as needed, and make CKAN extensions aware of this setting via the ckan.dow

CVSS3: 4.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-g9ph-j5vj-f8wm

Potential access to sensitive URLs via CKAN extensions (SSRF)

CVSS3: 4.5
0%
Низкий
больше 1 года назад

Уязвимостей на страницу