Miggo Logo

CVE-2023-28155:
Server-Side Request Forgery in Request

6.1

CVSS Score

Basic Information

EPSS Score
-
Published
3/16/2023
Updated
3/21/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
requestnpm<= 2.88.2
@cypress/requestnpm<= 2.88.123.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure handling of cross-protocol redirects in the redirect.js module. The key vulnerable code was in Redirect.prototype.onResponse where protocol changes were allowed without validation. The commit diff shows the addition of 'allowInsecureRedirect' check to gate this behavior, confirming this was the vulnerable path. The CVE description explicitly cites cross-protocol redirect handling as the exploit mechanism, and the patch directly modifies this function to add security controls.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** `r*qu*st` p**k*** t*rou** *.**.* *or No**.js *n* t** `@*ypr*ss/r*qu*st` p**k*** prior to *.*.* *llow * *yp*ss o* SSR* miti**tions vi* *n *tt**k*r-*ontroll*r s*rv*r t**t *o*s * *ross-proto*ol r**ir**t (*TTP to *TTPS, or *TTPS to *TTP). NOT*: T**

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* **n*lin* o* *ross-proto*ol r**ir**ts in t** r**ir**t.js mo*ul*. T** k*y vuln*r**l* *o** w*s in R**ir**t.prototyp*.onR*spons* w**r* proto*ol ***n**s w*r* *llow** wit*out v*li**tion. T** *ommit *i** s*ows t** ***it