Lucene search

K
githubGitHub Advisory DatabaseGHSA-93X8-66J2-WWR5
HistoryFeb 17, 2024 - 6:30 a.m.

Server-Side Request Forgery in github.com/greenpau/caddy-security

2024-02-1706:30:35
CWE-918
GitHub Advisory Database
github.com
7
server-side request forgery
ssrf
x-forwarded-host header manipulation
vulnerability
github
caddy
software security

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.6%

All versions of the package github.com/greenpau/caddy-security are vulnerable to Server-side Request Forgery (SSRF) via X-Forwarded-Host header manipulation. An attacker can expose sensitive information, interact with internal services, or exploit other vulnerabilities within the network by exploiting this vulnerability.

Affected configurations

Vulners
Node
github.com\/greenpau\/caddysecurityRange1.1.23

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.6%

Related for GHSA-93X8-66J2-WWR5