CVE-2023-42439
Summary
| CVE | CVE-2023-42439 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-09-15 21:15:00 UTC |
| Updated | 2023-11-04 02:00:00 UTC |
| Description | GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. A SSRF vulnerability exists starting in version 3.2.0, bypassing existing controls on the software. This can allow a user to request internal services for a full read SSRF, returning any data from the internal network. The application is using a whitelist, but the whitelist can be bypassed. The bypass will trick the application that the first host is a whitelisted address, but the browser will use `@` or `%40` as a credential to the host geoserver on port 8080, this will return the data to that host on the response. Version 4.1.3.post1 is the first available version that contains a patch. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Merge pull request from GHSA-pxg5-h34r-7q8p · GeoNode/geonode@79ac6e7 · GitHub |
MISC |
github.com |
|
| SSRF Bypass to return internal host data · Advisory · GeoNode/geonode · GitHub |
MISC |
github.com |
|
| Release 4.1.3 · GeoNode/geonode · GitHub |
MISC |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 995310 Python (Pip) Security Update for GeoNode (GHSA-pxg5-h34r-7q8p)