We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-40017

Geonode Server Side Request Forgery vulnerability



Description

GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. In versions 3.2.0 through 4.1.2, the endpoint `/proxy/?url=` does not properly protect against server-side request forgery. This allows an attacker to port scan internal hosts and request information from internal hosts. A patch is available at commit a9eebae80cb362009660a1fd49e105e7cdb499b9.

Reserved 2023-08-08 | Published 2023-08-24 | Updated 2024-10-02 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

>= 3.2.0, <= 4.1.2
affected

References

github.com/...eonode/security/advisories/GHSA-rmxg-6qqf-x8mr

github.com/...ommit/a9eebae80cb362009660a1fd49e105e7cdb499b9

cve.org (CVE-2023-40017)

nvd.nist.gov (CVE-2023-40017)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-40017

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.