CVE-2024-41812

txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Prior to version 1.7.0, a Server-Side Request Forgery (SSRF) vulnerability in the `/get` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.7.0 prevents displaying the response of forged requests, but the requests can still be sent. For complete mitigation, a firewall between txtdot and other internal network resources should be set.
Configurations

Configuration 1 (hide)

cpe:2.3:a:txtdot:txtdot:*:*:*:*:*:*:*:*

History

30 Sep 2024, 20:05

Type Values Removed Values Added
First Time Txtdot
Txtdot txtdot
References () https://github.com/TxtDot/txtdot/blob/a7fdaf80fdf45abefe83b2eb5135ba112142dc74/src/handlers/distributor.ts#L43-L47 - () https://github.com/TxtDot/txtdot/blob/a7fdaf80fdf45abefe83b2eb5135ba112142dc74/src/handlers/distributor.ts#L43-L47 - Patch
References () https://github.com/TxtDot/txtdot/commit/7c72d985f7a26ec1fd3cf628444717ca54986d2d - () https://github.com/TxtDot/txtdot/commit/7c72d985f7a26ec1fd3cf628444717ca54986d2d - Patch
References () https://github.com/TxtDot/txtdot/security/advisories/GHSA-4gj5-xj97-j8fp - () https://github.com/TxtDot/txtdot/security/advisories/GHSA-4gj5-xj97-j8fp - Exploit, Third Party Advisory
CPE cpe:2.3:a:txtdot:txtdot:*:*:*:*:*:*:*:*

29 Jul 2024, 14:12

Type Values Removed Values Added
Summary
  • (es) txtdot es un proxy HTTP que analiza sólo texto, enlaces e imágenes de las páginas, eliminando anuncios y scripts pesados. Antes de la versión 1.7.0, una vulnerabilidad de Server-Side Request Forgery (SSRF) en la ruta `/get` de txtdot permitía a atacantes remotos usar el servidor como proxy para enviar solicitudes HTTP GET a objetivos arbitrarios y recuperar información en el servidor interno. red. La versión 1.7.0 impide mostrar la respuesta de solicitudes falsificadas, pero las solicitudes aún se pueden enviar. Para una mitigación completa, se debe configurar un firewall entre txtdot y otros recursos de la red interna.

26 Jul 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-26 17:15

Updated : 2024-09-30 20:05


NVD link : CVE-2024-41812

Mitre link : CVE-2024-41812

CVE.ORG link : CVE-2024-41812


JSON object : View

Products Affected

txtdot

  • txtdot
CWE
CWE-918

Server-Side Request Forgery (SSRF)