logo

GHSA-vx3h-qwqw-r2wq inventree

Package

Manager: pip
Name: inventree
Vulnerable Version: >=0 <0.16.5

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: N/A pctlN/A

Details

Inventree Server-Side Request Forgery vulnerability exposes server port/internal IP ### Impact The "download image from remote URL" feature can be abused by a malicious actor to potentially extract information about server side resources. Submitting a crafted URL (in place of a valid image) can raise a server side error, which is reported back to the user. This error message may contain sensitive information about the server side request, including information about the availability of the remote resource. ### Patches The solution to this vulnerability is to prevent the server from returning any specific information about the observed exception. Instead, a generic error message is returned to the client. This patch has been applied to the upcoming 0.17.0 release, and also back-ported to the 0.16.5 stable release. ### Workarounds To avoid this issue with unpatched versions, the "download image from remote URL" feature can be disabled in InvenTree, preventing users from accessing this information. ### References Thanks to @febin0x10 for identifying this vulnerability and reporting it to us as per our security policy.

Metadata

Created: 2024-10-02T17:58:44Z
Modified: 2024-10-02T17:58:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-vx3h-qwqw-r2wq/GHSA-vx3h-qwqw-r2wq.json
CWE IDs: ["CWE-918"]
Alternative ID: N/A
Finding: F100
Auto approve: 1