Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.
Start learningUpgrade craftcms/cms to version 4.17.9, 5.9.15 or higher.
craftcms/cms is a content management system.
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in the asset upload mutations process. An attacker can interact with internal services by supplying specially crafted URLs using unsupported schemes, such as gopher, which bypasses standard hostname validation and allows raw TCP commands to be sent to internal endpoints. This is only exploitable if the GraphQL schema grants permissions to edit and create assets in a volume.