Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.
Start learningUpgrade com.facebook.presto:presto-client
to version 0.286 or higher.
com.facebook.presto:presto-client is a Presto Client
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the StatementClientV1
function. Presto JDBC can be affected by this vulnerability when connecting a remote Presto server. An attacker can view sensitive information from highly sensitive internal servers or perform a local port scan by constructing a redirect response that the client will follow.
Mitigation:
This vulnerability can be mitigated by disabling the redirect or adding a JDBC parameter such as allowRedirect.