We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-40017

Geonode Server Side Request Forgery vulnerability



AssignerGitHub_M
Reserved2023-08-08
Published2023-08-24
Updated2024-10-02

Description

GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. In versions 3.2.0 through 4.1.2, the endpoint `/proxy/?url=` does not properly protect against server-side request forgery. This allows an attacker to port scan internal hosts and request information from internal hosts. A patch is available at commit a9eebae80cb362009660a1fd49e105e7cdb499b9.



HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

>= 3.2.0, <= 4.1.2
affected

References

https://github.com/GeoNode/geonode/security/advisories/GHSA-rmxg-6qqf-x8mr

https://github.com/GeoNode/geonode/commit/a9eebae80cb362009660a1fd49e105e7cdb499b9

cve.org CVE-2023-40017

nvd.nist.gov CVE-2023-40017

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.