Server-Side Request Forgery (SSRF) Affecting github.com/usememos/memos/api/v1 package, versions <0.16.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.05% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSAPIV1-6670017
  • published21 Apr 2024
  • disclosed19 Apr 2024
  • creditKevin Stubbings

Introduced: 19 Apr 2024

CVE-2024-29029  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade github.com/usememos/memos/api/v1 to version 0.16.1 or higher.

Overview

github.com/usememos/memos/api/v1 is a lightweight note-taking service

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) due to an improper check of user-supplied URLs in the /o/get/image endpoint. An attacker can enumerate the internal network and retrieve images by sending crafted requests to this endpoint. The maliciously retrieved image's response is then included in the server's response to the attacker, leading to a reflected cross-site scripting (XSS) issue.

PoC

curl http://0.0.0.0:5230/o/get/<endpoint>?url=<full url>

CVSS Scores

version 3.1