Server-Side Request Forgery (SSRF) Affecting org.apache.hugegraph:hubble-be package, versions [,1.3.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEHUGEGRAPH-6672140
  • published23 Apr 2024
  • disclosed22 Apr 2024
  • credit6right

Introduced: 22 Apr 2024

CVE-2024-27347  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade org.apache.hugegraph:hubble-be to version 1.3.0 or higher.

Overview

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) due to improper validation of user-supplied URLs in the Hubble connection page. An attacker can send crafted requests that cause the server to make arbitrary requests to internal or external resources, potentially leading to sensitive information disclosure or unauthorized actions.

CVSS Scores

version 3.1