Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.
Start learningUpgrade craftcms/cms to version 4.17.9, 5.9.15 or higher.
craftcms/cms is a content management system.
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the actionResourceJs process. An attacker can cause the server to make arbitrary HTTP requests by supplying a malicious Host header when the trustedHosts configuration is not explicitly restricted. This is only exploitable if the application is running with the default configuration where trustedHosts is not set.