GMS-2021-36: Vulnerability allowing for reading internal HTTP resources
Impact
The vulnerability allows for reading and outputting files served by other services on the internal network in which the export server is hosted. If the export server is exposed to the internet, this potentially allows a malicious user to gain read access to internal web-resources.
The impact is limited to internal services that serve content via. HTTP(S), and requires the attacker to know internal hostnames/IP addresses.
The previous versions have been marked as deprecated on NPM.
Patches
released alongside this security advisory addresses the issue. Please note that this release is not backwards compatible out of the box. See the changelog for details.
Additionally, it’s also recommended to upgrade to the latest version of Highcharts to get the added input sanitation implemented.
Workarounds
There are no known workarounds to the issue - an upgrade to is required.
For more information
If you have any questions or comments about this advisory:
- Open an issue in the export server issue tracker
- Email us at security@highsoft.com
References
- github.com/advisories/GHSA-hfwx-c7q6-g54c
- github.com/highcharts/node-export-server/blob/master/CHANGELOG.md
- github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6
- github.com/highcharts/node-export-server/security/advisories/GHSA-hfwx-c7q6-g54c
- www.npmjs.com/package/highcharts-export-server
Detect and mitigate GMS-2021-36 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →