Server-Side Request Forgery (SSRF) Affecting node-pdf-generator package, versions *
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.13% (48th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-NODEPDFGENERATOR-609636
- published 5 Oct 2020
- disclosed 3 Sep 2020
- credit Vasilii Ermilov
Introduced: 3 Sep 2020
CVE-2020-7740 Open this link in a new tabHow to fix?
There is no fixed version for node-pdf-generator
.
Overview
node-pdf-generator is a Web server to generate PDF's from HTML
Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF). Due to lack of user input validation and sanitization done to the content given to node-pdf-generator
, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack.
PoC
git clone https://github.com/darrenhaken/node-pdf-generator.git
cd node-pdf-generator
npm install
node index.js
The app will be available at https://localhost:1337
send crafted request like:
curl --location --request POST 'https://127.0.0.1:1337/' --header 'Content-Type: text/html' --data-raw ''