Server-Side Request Forgery (SSRF)

Affecting terriajs-server package, versions <2.7.4

Do your applications use this vulnerable package? Test your applications

Overview

terriajs-server is a basic NodeJS Express server that serves up a (not included) static TerriaJS-based site (such as National Map) with a few additional useful services.

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF). Once an attacker has access to a server whitelisted by the terriajs-server proxy, or the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the terriajs-server proxy can be used to access any HTTP resources accessible to the server, including private data in the hosting environment.

Remediation

Upgrade terriajs-server to version 2.7.4 or higher.

References

CVSS Score

6.5
medium severity
  • Attack Vector
    Network
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    Low
  • Availability
    None
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Credit
Kevin Ring
CWE
CWE-918
Snyk ID
SNYK-JS-TERRIAJSSERVER-73556
Disclosed
30 Aug, 2018
Published
20 Jan, 2019