Server-Side Request Forgery (SSRF) Affecting github.com/usememos/memos/api/v1 package, versions <0.16.1


0.0
medium

Snyk CVSS

    Attack Complexity Low
    User Interaction Required
    Scope Changed

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 0.06% (26th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSAPIV1-6670017
  • published 21 Apr 2024
  • disclosed 19 Apr 2024
  • credit Kevin Stubbings

How to fix?

Upgrade github.com/usememos/memos/api/v1 to version 0.16.1 or higher.

Overview

github.com/usememos/memos/api/v1 is a lightweight note-taking service

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) due to an improper check of user-supplied URLs in the /o/get/image endpoint. An attacker can enumerate the internal network and retrieve images by sending crafted requests to this endpoint. The maliciously retrieved image's response is then included in the server's response to the attacker, leading to a reflected cross-site scripting (XSS) issue.

PoC

curl http://0.0.0.0:5230/o/get/<endpoint>?url=<full url>