Server-side Request Forgery (SSRF) Affecting github.com/umputun/remark42/backend/app/store package, versions <1.13.0


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.28% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMUMPUTUNREMARK42BACKENDAPPSTORE-6028332
  • published26 Oct 2023
  • disclosed23 Oct 2023
  • creditjet-pentest

Introduced: 23 Oct 2023

CVE-2023-45966  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade github.com/umputun/remark42/backend/app/store to version 1.13.0 or higher.

Overview

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the /api/v1/comment component. An attacker can make the server send requests to arbitrary domains, potentially leading to data exposure or remote code execution, by sending a malicious URL to /api/v1/comment?site=<SITE_ID> when the "title" field is missing in the comment request.

PoC

{"text":"qweqwe","locator":{"site":"remark","url":"https://j5pxshabxb5037lms6z182pkjbp4d01p.oastify.com"}}

CVSS Base Scores

version 3.1