CVE-2023-22493: RSSHub SSRF vulnerability
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.21359%
CWE
Published
1/11/2023
Updated
1/23/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rsshub | npm | < 1.0.0-master.a66cbcf | 1.0.0-master.a66cbcf |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from route handlers accepting user-controlled parameters to construct backend URLs without proper domain validation. The commit adds 'isValidHost' checks across multiple route files, indicating these handlers previously lacked validation. Each listed function corresponds to a route that was modified to add security checks, with their absence previously enabling SSRF through crafted parameters. The high confidence comes from direct correlation between added validation in the fix and previously missing security controls.