Vulnerability Details : CVE-2023-42439
Potential exploit
GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. A SSRF vulnerability exists starting in version 3.2.0, bypassing existing controls on the software. This can allow a user to request internal services for a full read SSRF, returning any data from the internal network. The application is using a whitelist, but the whitelist can be bypassed. The bypass will trick the application that the first host is a whitelisted address, but the browser will use `@` or `%40` as a credential to the host geoserver on port 8080, this will return the data to that host on the response. Version 4.1.3.post1 is the first available version that contains a patch.
Vulnerability category: Server-side request forgery (SSRF)
Products affected by CVE-2023-42439
- cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-42439
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 22 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-42439
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2023-42439
-
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-42439
-
https://github.com/GeoNode/geonode/commit/79ac6e70419c2e0261548bed91c159b54ff35b8d
Merge pull request from GHSA-pxg5-h34r-7q8p · GeoNode/geonode@79ac6e7 · GitHubPatch
-
https://github.com/GeoNode/geonode/security/advisories/GHSA-pxg5-h34r-7q8p
SSRF Bypass to return internal host data · Advisory · GeoNode/geonode · GitHubExploit;Third Party Advisory
-
https://github.com/GeoNode/geonode/releases/tag/4.1.3
Release 4.1.3 · GeoNode/geonode · GitHubRelease Notes
Jump to