Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. geonode
  4. ›
  5. CVE-2023-40017

CVE-2023-40017: Server-Side Request Forgery (SSRF)

August 24, 2023 (updated August 30, 2023)

GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. In versions 3.2.0 through 4.1.2, the endpoint /proxy/?url= does not properly protect against server-side request forgery. This allows an attacker to port scan internal hosts and request information from internal hosts. A patch is available at commit a9eebae80cb362009660a1fd49e105e7cdb499b9.

References

  • github.com/GeoNode/geonode/commit/a9eebae80cb362009660a1fd49e105e7cdb499b9
  • github.com/GeoNode/geonode/security/advisories/GHSA-rmxg-6qqf-x8mr
  • nvd.nist.gov/vuln/detail/CVE-2023-40017

Code Behaviors & Features

Detect and mitigate CVE-2023-40017 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.2.0 up to 4.1.2

Solution

Unfortunately, there is no solution available yet.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

npm/geonode/CVE-2023-40017.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:04 +0000.