Server-Side Request Forgery (SSRF) Affecting kubeflow-centraldashboard package, versions <1.8.0-r4


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.12% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-KUBEFLOWCENTRALDASHBOARD-6615701
  • published16 Apr 2024
  • disclosed16 Mar 2023

Introduced: 16 Mar 2023

CVE-2023-28155  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade Chainguard kubeflow-centraldashboard to version 1.8.0-r4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kubeflow-centraldashboard package and not the kubeflow-centraldashboard package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

CVSS Scores

version 3.1