CVE-2021-23664

The package @isomorphic-git/cors-proxy before 2.7.1 are vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization and validation of the redirection action in middleware.js.
Configurations

Configuration 1 (hide)

cpe:2.3:a:isomorphic-git:cors-proxy:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 8.6
References () https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311 - Patch, Third Party Advisory () https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311 - Patch, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788 - Exploit, Patch, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788 - Exploit, Patch, Third Party Advisory

Information

Published : 2022-01-21 20:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23664

Mitre link : CVE-2021-23664

CVE.ORG link : CVE-2021-23664


JSON object : View

Products Affected

isomorphic-git

  • cors-proxy
CWE
CWE-918

Server-Side Request Forgery (SSRF)