The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf | Exploit Patch Technical Description Third Party Advisory |
https://github.com/request/request/issues/3442 | Exploit Issue Tracking Patch Technical Description Vendor Advisory |
https://github.com/request/request/pull/3444 | Patch |
https://security.netapp.com/advisory/ntap-20230413-0007/ |
Configurations
History
07 Nov 2023, 04:10
Type | Values Removed | Values Added |
---|---|---|
Summary | The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. |
Information
Published : 2023-03-16 15:15
Updated : 2024-08-02 13:15
NVD link : CVE-2023-28155
Mitre link : CVE-2023-28155
CVE.ORG link : CVE-2023-28155
JSON object : View
Products Affected
request_project
- request
CWE
CWE-918
Server-Side Request Forgery (SSRF)