geonode@4.1.1 vulnerabilities

Application for serving and sharing geospatial data

  • latest version

    4.4.1

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    1 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the geonode package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    geonode is an application for serving and sharing geospatial data

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The applications cookies are set securely, but it is possible to retrieve a victims CSRF token and issue a request to change another user's email address to perform a full account takeover. Due to the script element not impacting the CORS policy, requests will succeed.

    How to fix Cross-site Scripting (XSS)?

    Upgrade geonode to version 4.2.3 or higher.

    [3.2.0,4.2.3)
    • H
    Server-side Request Forgery (SSRF)

    geonode is an application for serving and sharing geospatial data

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the geospatial data sharing feature. An attacker can bypass existing controls and request internal services, returning any data from the internal network.

    Note:

    The application uses a whitelist, but this can be bypassed by tricking the application into believing the first host is a whitelisted address, while the browser uses @ or %40 as a credential to the host geoserver on port 8080.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade geonode to version 4.1.3 or higher.

    [3.2.0,4.1.3)
    • H
    Server-side Request Forgery (SSRF)

    geonode is an application for serving and sharing geospatial data

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the /proxy/?url= endpoint. An attacker can port scan internal hosts and request information from internal hosts by exploiting the insufficient protection against server-side request forgery.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade geonode to version 4.1.5 or higher.

    [,4.1.5)