Server-Side Request Forgery (SSRF) Affecting node-request package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.12% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN10-NODEREQUEST-3366789
  • published21 Mar 2023
  • disclosed16 Mar 2023

Introduced: 16 Mar 2023

CVE-2023-28155  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

There is no fixed version for Debian:10 node-request.

NVD Description

Note: Versions mentioned in the description apply only to the upstream node-request package and not the node-request package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

CVSS Scores

version 3.1