{ "schema_version": "1.4.0", "id": "GHSA-vx9g-377x-xwxq", "modified": "2022-06-01T22:20:04Z", "published": "2022-04-26T00:00:41Z", "aliases": [ "CVE-2022-27311" ], "summary": "Server side request forgery in gibbon", "details": "Gibbon v3.4.3 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL. This issue has been resolved in version 3.4.4", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [ { "package": { "ecosystem": "RubyGems", "name": "gibbon" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "3.4.4" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27311" }, { "type": "WEB", "url": "https://github.com/amro/gibbon/pull/321" }, { "type": "WEB", "url": "https://github.com/amro/gibbon/pull/321#issuecomment-1113147155" }, { "type": "WEB", "url": "https://github.com/amro/gibbon/commit/b2eb99ed304d7491a6d348a5bbdc83a008fc6e0b" }, { "type": "WEB", "url": "https://github.com/amro/gibbon/commit/cade20ca2438cd1b182dad70cbb77fb895779d10" }, { "type": "PACKAGE", "url": "https://github.com/amro/gibbon" }, { "type": "WEB", "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/gibbon/CVE-2022-27311.yml" } ], "database_specific": { "cwe_ids": [ "CWE-918" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2022-04-27T18:48:09Z", "nvd_published_at": "2022-04-25T13:15:00Z" } }