Paranoidhttp before 0.3.0 allows SSRF because [::] is equivalent to the 127.0.0.1 address, but does not match the filter for private addresses.
References
Link | Resource |
---|---|
https://github.com/hakobe/paranoidhttp/compare/v0.2.0...v0.3.0 | Patch Third Party Advisory |
https://github.com/hakobe/paranoidhttp/blob/master/CHANGELOG.md#v030-2023-01-19 | Release Notes Third Party Advisory |
https://github.com/hakobe/paranoidhttp/commit/07f671da14ce63a80f4e52432b32e8d178d75fd3 | Patch Third Party Advisory |
Configurations
Information
Published : 2023-01-29 21:15
Updated : 2023-02-07 07:04
NVD link : CVE-2023-24623
Mitre link : CVE-2023-24623
JSON object : View
CWE
CWE-918
Server-Side Request Forgery (SSRF)
Products Affected
paranoidhttp_project
- paranoidhttp