CVE-2023-49799

Published: Dic 09, 2023 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2023-3089 Aliases: GHSA-3wfp-253j-5jxv
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none

Description

AI Translation Available

`nuxt-api-party` is an open source module to proxy API requests. nuxt-api-party attempts to check if the user has passed an absolute URL to prevent the aforementioned attack. This has been recently changed to use the regular expression `^https?://`, however this regular expression can be bypassed by an absolute URL with leading whitespace. For example `\nhttps://whatever.com` which has a leading newline. According to the fetch specification, before a fetch is made the URL is normalized. 'To normalize a byte sequence potentialValue, remove any leading and trailing HTTP whitespace bytes from potentialValue.'. This means the final request will be normalized to `https://whatever.com` bypassing the check and nuxt-api-party will send a request outside of the whitelist. This could allow us to leak credentials or perform Server-Side Request Forgery (SSRF). This vulnerability has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should revert to the previous method of detecting absolute URLs.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0187
Percentile
0,8th
Updated

EPSS Score Trend (Last 90 Days)

918

Server-Side Request Forgery (SSRF)

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Access Control
Potential Impacts:
Read Application Data Execute Unauthorized Code Or Commands Bypass Protection Mechanism
Applicable Platforms
Technologies: AI/ML, Web Based, Web Server
View CWE Details
Application

Nuxt Api Party by Johannschopplich

Version Range Affected
To 0.21.3 (inclusive)
cpe:2.3:a:johannschopplich:nuxt_api_party:*:*:*:*:*:node.js:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://fetch.spec.whatwg.org/
https://fetch.spec.whatwg.org/#http-whitespace-byte
https://github.com/johannschopplich/nuxt-api-party/blob/777462e1e3af1d9f8938aa3…
https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wf…
https://infra.spec.whatwg.org/#byte-sequence
https://fetch.spec.whatwg.org/
https://fetch.spec.whatwg.org/#http-whitespace-byte
https://github.com/johannschopplich/nuxt-api-party/blob/777462e1e3af1d9f8938aa3…
https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wf…
https://infra.spec.whatwg.org/#byte-sequence