CVE-2020-8135 – @uppy/companion
Package
Manager: npm
Name: @uppy/companion
Vulnerable Version: >=0 <1.9.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
EPSS: 0.0051 pctl0.65403
Details
Server-Side Request Forgery in @uppy/companion Versions of `@uppy/companion` prior to 1.9.3 are vulnerable to Server-Side Request Forgery (SSRF). The `get` route passes the user-controlled variable `req.body.url` to a GET request without sanitizing the value. This allows attackers to inject arbitrary URLs and make GET requests on behalf of the server. ## Recommendation Upgrade to version 1.9.3 or later.
Metadata
Created: 2020-09-03T15:51:19Z
Modified: 2020-08-31T19:01:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-mm7r-265w-jv6f/GHSA-mm7r-265w-jv6f.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-mm7r-265w-jv6f
Finding: F100
Auto approve: 1