Server-Side Request Forgery (SSRF) Affecting ckan package, versions [,2.10.5)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-CKAN-7786366
- published 22 Aug 2024
- disclosed 21 Aug 2024
- credit Unknown
Introduced: 21 Aug 2024
CVE-2024-43371 Open this link in a new tabHow to fix?
Upgrade ckan
to version 2.10.5 or higher.
Overview
ckan is a world’s leading Open Source data portal platform.
It powers dozens of Open Data portals around the world, including data.gov, open.canada.ca and europeandataportal.eu but also regional, research and community organizations.
It makes easy to publish, share and find data online and is fully customizable via extensions and plugins.
Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) due to missing checks via the use of CKAN plugins, including XLoader,
DataPusher,
Resource proxy
, and context-archiver,
that download content of local or remote files using the resources URLs. An attacker can create a resource with a URL pointing to unauthorized locations and potentially retrieve restricted data.
Workaround
Users that are not able to upgrade to the fixed version can:
- Use a separate HTTP proxy like Squid to control access to URLs
- Implement custom firewall rules
- Use validators on the resource
URL
field to restrict access to certain domains or IPs.