Server-side Request Forgery (SSRF) Affecting geonode package, versions [,4.1.5)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.15% (53rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-GEONODE-5858648
  • published25 Aug 2023
  • disclosed24 Aug 2023
  • creditTobyDavenn

Introduced: 24 Aug 2023

CVE-2023-40017  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade geonode to version 4.1.5 or higher.

Overview

geonode is an application for serving and sharing geospatial data

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the /proxy/?url= endpoint. An attacker can port scan internal hosts and request information from internal hosts by exploiting the insufficient protection against server-side request forgery.

References

CVSS Scores

version 3.1