You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
artegoser
published
GHSA-4c78-229v-hf6mMar 5, 2024
Package
txtdot/txtdot
(GitHub Packages)
Affected versions
>= 1.4.0, < 1.6.1
Patched versions
>= 1.6.1
Description
Summary
Serveral Server-Side Request Forgery (SSRF) vulnerability in the /proxy route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network.
Details
The URL from user input is not checked before sending server-side request:
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Learn more on MITRE.
Summary
Serveral Server-Side Request Forgery (SSRF) vulnerability in the
/proxy
route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network.Details
The URL from user input is not checked before sending server-side request:
https://github.com/TxtDot/txtdot/blob/a7fdaf80fdf45abefe83b2eb5135ba112142dc74/src/routes/browser/proxy.ts#L6-L17
This allows SSRF attacks.
PoC
https://txt.artegoser.ru/proxy?url=http://localhost:8080
Impact
Remote attackers can retrieve information in the internal network.