Skip to content

Server-Side Request Forgery in terriajs-server

High severity GitHub Reviewed Published May 29, 2019 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm terriajs-server (npm)

Affected versions

< 2.7.4

Patched versions

2.7.4

Description

Versions of terriajs-serverprior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-server proxy to access any HTTP-accessible resources that are accessible to the server, including private resources in the hosting environment.

Recommendation

Upgrade to version 2.7.4 or later.

References

Reviewed May 29, 2019
Published to the GitHub Advisory Database May 29, 2019
Last updated Jan 9, 2023

Severity

High

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-p72p-rjr2-r439

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.