`nuxt-api-party` is an open source module to proxy API requests. nuxt-api-party attempts to check if the user has passed an absolute URL to prevent the aforementioned attack. This has been recently changed to use the regular expression `^https?://`, however this regular expression can be bypassed by an absolute URL with leading whitespace. For example `\nhttps://whatever.com` which has a leading newline. According to the fetch specification, before a fetch is made the URL is normalized. "To normalize a byte sequence potentialValue, remove any leading and trailing HTTP whitespace bytes from potentialValue.". This means the final request will be normalized to `https://whatever.com` bypassing the check and nuxt-api-party will send a request outside of the whitelist. This could allow us to leak credentials or perform Server-Side Request Forgery (SSRF). This vulnerability has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should revert to the previous method of detecting absolute URLs.
References
Link | Resource |
---|---|
https://fetch.spec.whatwg.org/ | Not Applicable |
https://fetch.spec.whatwg.org/#http-whitespace-byte | Not Applicable |
https://github.com/johannschopplich/nuxt-api-party/blob/777462e1e3af1d9f8938aa33f230cd8cb6e0cc9a/src/runtime/server/handler.ts#L31 | Issue Tracking |
https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wfp-253j-5jxv | Exploit Mitigation Vendor Advisory |
https://infra.spec.whatwg.org/#byte-sequence | Not Applicable |
https://fetch.spec.whatwg.org/ | Not Applicable |
https://fetch.spec.whatwg.org/#http-whitespace-byte | Not Applicable |
https://github.com/johannschopplich/nuxt-api-party/blob/777462e1e3af1d9f8938aa33f230cd8cb6e0cc9a/src/runtime/server/handler.ts#L31 | Issue Tracking |
https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wfp-253j-5jxv | Exploit Mitigation Vendor Advisory |
https://infra.spec.whatwg.org/#byte-sequence | Not Applicable |
Configurations
History
21 Nov 2024, 08:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://fetch.spec.whatwg.org/ - Not Applicable | |
References | () https://fetch.spec.whatwg.org/#http-whitespace-byte - Not Applicable | |
References | () https://github.com/johannschopplich/nuxt-api-party/blob/777462e1e3af1d9f8938aa33f230cd8cb6e0cc9a/src/runtime/server/handler.ts#L31 - Issue Tracking | |
References | () https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wfp-253j-5jxv - Exploit, Mitigation, Vendor Advisory | |
References | () https://infra.spec.whatwg.org/#byte-sequence - Not Applicable |
13 Dec 2023, 17:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-09 00:15
Updated : 2024-11-21 08:33
NVD link : CVE-2023-49799
Mitre link : CVE-2023-49799
CVE.ORG link : CVE-2023-49799
JSON object : View
Products Affected
johannschopplich
- nuxt_api_party
CWE
CWE-918
Server-Side Request Forgery (SSRF)