Information Exposure Affecting gatsby-plugin-sharp package, versions <5.10.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.1% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-GATSBYPLUGINSHARP-5671648
  • published8 Jun 2023
  • disclosed8 Jun 2023
  • creditMaxwell Garrett

Introduced: 8 Jun 2023

CVE-2023-34238  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade gatsby-plugin-sharp to version 5.10.0 or higher.

Overview

gatsby-plugin-sharp is a low-level helper plugin generally used by other Gatsby plugins that exposes several image processing functions built on the Sharp image processing library.

Affected versions of this package are vulnerable to Information Exposure via local file inclusion in __file-code-frame or __original-stack-frame, when gatsby develop is in use and exposed to the internet.

NOTE: By default gatsby develop is only accessible via the localhost 127.0.0.1, and one would need to intentionally expose the server to other interfaces to exploit this vulnerability by using server options such as --host 0.0.0.0, -H 0.0.0.0, or the GATSBY_HOST=0.0.0.0 environment variable.

PoC

# Local File Inclusion in __file-code-frame
$ curl "http://127.0.0.1:8000/__file-code-frame?filePath=/etc/passwd&lineNumber=1"

# Local File Inclusion in __original-stack-frame
$ curl "http://127.0.0.1:8000/__original-stack-frame?moduleId=/etc/hosts&lineNumber=1&skipSourceMap=1"

CVSS Scores

version 3.1