CVE-2023-40017: GeoNode Server Side Request forgery
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.25632%
CWE
Published
11/21/2024
Updated
11/21/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| geonode | pip | >= 3.2.0, < 4.2.0 | 4.2.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper URL parsing in the proxy endpoint's host validation. The key indicators are:
- The commit modifies the validation logic to use a new extract_ip_or_domain function instead of url.hostname
- Added tests demonstrate SSRF attempts using @ and URL-encoded fragments
- The CWE-918 classification confirms it's an SSRF validation flaw
- The patch introduces ipaddress validation and regex-based extraction to properly handle potentially malicious URL formats