Server-Side Request Forgery (SSRF) Affecting terriajs-server package, versions <2.7.4
Snyk CVSS
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-TERRIAJSSERVER-73556
- published 20 Jan 2019
- disclosed 30 Aug 2018
- credit Kevin Ring
How to fix?
Upgrade terriajs-server
to version 2.7.4 or higher.
Overview
terriajs-server is a basic NodeJS Express server that serves up a (not included) static TerriaJS-based site (such as National Map) with a few additional useful services.
Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF). Once an attacker has access to a server whitelisted by the terriajs-server proxy, or the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the terriajs-server proxy can be used to access any HTTP resources accessible to the server, including private data in the hosting environment.