CVE-2023-28155

The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf Exploit Patch Technical Description Third Party Advisory
https://github.com/request/request/issues/3442 Exploit Issue Tracking Patch Technical Description Vendor Advisory
https://github.com/request/request/pull/3444 Patch
https://security.netapp.com/advisory/ntap-20230413-0007/
Configurations

Configuration 1 (hide)

cpe:2.3:a:request_project:request:*:*:*:*:*:node.js:*:*

History

07 Nov 2023, 04:10

Type Values Removed Values Added
Summary ** UNSUPPORTED WHEN ASSIGNED ** The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Information

Published : 2023-03-16 15:15

Updated : 2024-08-02 13:15


NVD link : CVE-2023-28155

Mitre link : CVE-2023-28155

CVE.ORG link : CVE-2023-28155


JSON object : View

Products Affected

request_project

  • request
CWE
CWE-918

Server-Side Request Forgery (SSRF)