@budibase/server@3.35.3

Budibase Web Server

  • latest version

    3.36.2

  • first published

    6 years ago

  • latest version published

    9 hours ago

  • licenses detected

    • >=0.0.0 <0.0.1; >=0.0.999-alpha.30 <0.1.0; >=0.9.188
  • Direct Vulnerabilities

    Known vulnerabilities in the @budibase/server package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Server-side Request Forgery (SSRF)

    @budibase/server is a Budibase Web Server

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the preview() in the REST datasource query endpoint, which allows user-supplied URLs in the fields.path parameter to be requested by the server without validation. An attacker can access internal network resources, cloud metadata endpoints, and sensitive internal services by supplying arbitrary URLs.

    Note: This is only exploitable if the attacker is an authenticated admin or builder user.

    How to fix Server-side Request Forgery (SSRF)?

    There is no fixed version for @budibase/server.

    *