RSSHub is an open source RSS feed generator. RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network. An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. An attacker could also use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack. The patch for this issue can be found in commit a66cbcf.
References
Link | Resource |
---|---|
https://github.com/DIYgod/RSSHub/commit/a66cbcf6eebc700bf97ab097f404f16ab415506a | Patch Third Party Advisory |
https://github.com/DIYgod/RSSHub/pull/11588 | Patch Third Party Advisory |
https://github.com/DIYgod/RSSHub/security/advisories/GHSA-64wp-jh9p-5cg2 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-01-13 15:15
Updated : 2024-02-28 19:51
NVD link : CVE-2023-22493
Mitre link : CVE-2023-22493
CVE.ORG link : CVE-2023-22493
JSON object : View
Products Affected
rsshub
- rsshub
CWE
CWE-918
Server-Side Request Forgery (SSRF)