Server-Side Request Forgery (SSRF) Affecting decidim-templates package, versions >=0.23.0, <0.27.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-DECIDIMTEMPLATES-6256325
  • published21 Feb 2024
  • disclosed20 Feb 2024
  • creditUnknown

Introduced: 20 Feb 2024

CVE-2023-47635  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade decidim-templates to version 0.27.5 or higher.

Overview

decidim-templates is a This module provides a solution to create templates for different Decidim models, such as Proposals and Questionnaires.

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) due to the authenticity token check being disabled for the questionnaire templates preview.

Note:

This issue does not pose a serious security threat as access to the session cookie is also required to view this resource. Although this URL does not permit resource modification, it could enable attackers to access information not intended for public disclosure.

CVSS Scores

version 3.1