Miggo Logo

CVE-2023-40017: GeoNode Server Side Request forgery

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.25632%
Published
11/21/2024
Updated
11/21/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
geonodepip>= 3.2.0, < 4.2.04.2.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper URL parsing in the proxy endpoint's host validation. The key indicators are:

  1. The commit modifies the validation logic to use a new extract_ip_or_domain function instead of url.hostname
  2. Added tests demonstrate SSRF attempts using @ and URL-encoded fragments
  3. The CWE-918 classification confirms it's an SSRF validation flaw
  4. The patch introduces ipaddress validation and regex-based extraction to properly handle potentially malicious URL formats

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry * s*rv*r si** r*qu*st *or**ry vuln w*s *oun* wit*in **ono** w**n t*stin* on * *u* *ounty pro*r*m. S*rv*r si** r*qu*st *or**ry *llows * us*r to r*qu*st in*orm*tion on t** int*rn*l s*rvi**/s*rvi**s. ### **t*ils T** *n*point /proxy/?url= *o

Reasoning

T** vuln*r**ility st*mm** *rom improp*r URL p*rsin* in t** proxy *n*point's *ost v*li**tion. T** k*y in*i**tors *r*: *. T** *ommit mo*i*i*s t** v*li**tion lo*i* to us* * n*w *xtr**t_ip_or_*om*in *un*tion inst*** o* url.*ostn*m* *. ***** t*sts **monst