The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Link | Tags |
---|---|
https://github.com/request/request/issues/3442 | issue tracking patch vendor advisory exploit technical description |
https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf | patch exploit third party advisory technical description |
https://github.com/request/request/pull/3444 | patch |
https://security.netapp.com/advisory/ntap-20230413-0007/ |