{ "schema_version": "1.4.0", "id": "GHSA-p72p-rjr2-r439", "modified": "2020-08-31T18:35:03Z", "published": "2019-05-29T20:24:02Z", "aliases": [], "summary": "Server-Side Request Forgery in terriajs-server", "details": "Versions of `terriajs-server`prior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-server proxy to access any HTTP-accessible resources that are accessible to the server, including private resources in the hosting environment.\n\n\n## Recommendation\n\nUpgrade to version 2.7.4 or later.", "severity": [], "affected": [ { "package": { "ecosystem": "npm", "name": "terriajs-server" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.7.4" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0" }, { "type": "WEB", "url": "https://medium.com/terria/security-vulnerability-in-terriajs-server-82c8bf4da0a5" }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/768" } ], "database_specific": { "cwe_ids": [ "CWE-918" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2019-05-29T20:23:25Z", "nvd_published_at": null } }