Server-Side Request Forgery (SSRF) Affecting ckan package, versions [,2.10.5)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-CKAN-7786366
  • published22 Aug 2024
  • disclosed21 Aug 2024
  • creditUnknown

Introduced: 21 Aug 2024

CVE-2024-43371  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade ckan to version 2.10.5 or higher.

Overview

ckan is a world’s leading Open Source data portal platform.

It powers dozens of Open Data portals around the world, including data.gov, open.canada.ca and europeandataportal.eu but also regional, research and community organizations.

It makes easy to publish, share and find data online and is fully customizable via extensions and plugins.

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) due to missing checks via the use of CKAN plugins, including XLoader, DataPusher, Resource proxy, and context-archiver, that download content of local or remote files using the resources URLs. An attacker can create a resource with a URL pointing to unauthorized locations and potentially retrieve restricted data.

Workaround

Users that are not able to upgrade to the fixed version can:

  1. Use a separate HTTP proxy like Squid to control access to URLs
  2. Implement custom firewall rules
  3. Use validators on the resource URL field to restrict access to certain domains or IPs.

CVSS Scores

version 4.0
version 3.1