Server-side Request Forgery (SSRF)

Affecting strapi package, versions <3.2.5

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

strapi is a HTTP layer sits on top of Koa.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF). admin/src/containers/InputModalStepperProvider/index.js has a /proxy?url= functionality which could be abused to route to internal IPs and access private IPs available to the server.

Remediation

Upgrade strapi to version 3.2.5 or higher.

References

CVSS Score

7.2
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Changed
  • Confidentiality
    Low
  • Integrity
    Low
  • Availability
    None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/RL:O
Credit
Unknown
CVE
CVE-2020-27664
CWE
CWE-918
Snyk ID
SNYK-JS-STRAPI-1022256
Disclosed
27 Oct, 2020
Published
29 Oct, 2020