Miggo Logo

CVE-2023-22493: RSSHub SSRF vulnerability

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.21359%
Published
1/11/2023
Updated
1/23/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
rsshubnpm< 1.0.0-master.a66cbcf1.0.0-master.a66cbcf

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from route handlers accepting user-controlled parameters to construct backend URLs without proper domain validation. The commit adds 'isValidHost' checks across multiple route files, indicating these handlers previously lacked validation. Each listed function corresponds to a route that was modified to add security checks, with their absence previously enabling SSRF through crafted parameters. The high confidence comes from direct correlation between added validation in the fix and previously missing security controls.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Summ*ry RSS*u* is vuln*r**l* to S*rv*r-Si** R*qu*st *or**ry (SSR*) *tt**ks. T*is vuln*r**ility *llows *n *tt**k*r to s*n* *r*itr*ry *TTP r*qu*sts *rom t** s*rv*r to ot**r s*rv*rs or r*sour**s on t** n*twork. ## **s*ription *n *tt**k*r **n *xplo

Reasoning

T** vuln*r**ility st*mm** *rom rout* **n*l*rs ****ptin* us*r-*ontroll** p*r*m*t*rs to *onstru*t ***k*n* URLs wit*out prop*r *om*in v*li**tion. T** *ommit ***s 'isV*li**ost' ****ks **ross multipl* rout* *il*s, in*i**tin* t**s* **n*l*rs pr*viously l**k