CVE-2023-22493 – rsshub
Package
Manager: npm
Name: rsshub
Vulnerable Version: >=0 <1.0.0-master.a66cbcf
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00126 pctl0.32706
Details
RSSHub SSRF vulnerability ## Summary RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network. ## Description An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. For example, if an attacker controls the `ATTACKER.HOST` domain, they can send a request to affected routes with the value set to `ATTACKER.HOST%2F%23`. The `%2F` and `%23` characters are URL-encoded versions of the forward-slash (`/`) and pound (`#`) characters, respectively. In this context, an attacker could use those characters to append the base URL (i.e. `https://${input}.defined.host`) to be modified to `https://ATTACKER.HOST/#.defined.host`. This will cause the server to send a request to the attacker-controlled domain, allowing the attacker to potentially gain access to sensitive information or perform further attacks on the server. ## Impact An attacker could use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack. ## Reference Fixing PR: https://github.com/DIYgod/RSSHub/pull/11588
Metadata
Created: 2023-01-11T22:04:44Z
Modified: 2023-01-23T22:17:31Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-64wp-jh9p-5cg2/GHSA-64wp-jh9p-5cg2.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-64wp-jh9p-5cg2
Finding: F100
Auto approve: 1