GHSA-rmxg-6qqf-x8mr

Suggest an improvement
Source
https://github.com/advisories/GHSA-rmxg-6qqf-x8mr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-rmxg-6qqf-x8mr/GHSA-rmxg-6qqf-x8mr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rmxg-6qqf-x8mr
Aliases
Published
2024-11-21T22:22:03Z
Modified
2024-11-21T22:39:12.140940Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
GeoNode Server Side Request forgery
Details

Summary

A server side request forgery vuln was found within geonode when testing on a bug bounty program. Server side request forgery allows a user to request information on the internal service/services.

Details

The endpoint /proxy/?url= does not properly protect against SSRF. when using the following format you can request internal hosts and display data. /proxy/?url=http://169.254.169.254\@whitelistedIPhere. This will state wether the AWS internal IP is alive. If you get a 404, the host is alive. A non alive host will not display a response. To display metadata, use a hashfrag on the url /proxy/?url=http://169.254.169.254\@#whitelisteddomain.com or try /proxy/?url=http://169.254.169.254\@%23whitelisteddomain.com

Impact

Port scan internal hosts, and request information from internal hosts.

References

Affected packages

PyPI / geonode

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.2.0
Fixed
4.2.0

Affected versions

3.*

3.2.0
3.2.1
3.2.2
3.2.3
3.2.3.post1
3.2.4
3.3.0
3.3.1
3.3.1.post1
3.3.2
3.3.2.post1
3.3.2.post2
3.3.3

4.*

4.0.0rc0
4.0.0rc1
4.0.0
4.0.0.post1
4.0.1
4.0.2
4.0.3
4.1.0
4.1.1
4.1.2
4.1.3
4.1.3.post1
4.1.4
4.1.5