Miggo Logo

CVE-2023-48711: google-translate-api-browser Server-Side Request Forgery (SSRF) Vulnerability

3.7

CVSS Score
3.1

Basic Information

EPSS Score
0.19882%
Published
11/27/2023
Updated
11/27/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
google-translate-api-browsernpm< 4.1.04.1.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The core vulnerability exists in generateRequestUrl's handling of the 'tld' parameter. The commit diff shows this function was modified to add TLD validation using a regex pattern, confirming it was previously vulnerable. The function directly incorporates user-supplied 'tld' into the URL construction, and the PoC demonstrates how malicious TLD values lead to SSRF. Other functions like translate() merely consume the generated URL but don't directly handle the vulnerable parameter validation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry * S*rv*r-Si** R*qu*st *or**ry (SSR*) Vuln*r**ility is pr*s*nt in *ppli**tions utilizin* t** `*oo*l*-tr*nsl*t*-*pi-*rows*r` p**k*** *n* *xposin* t** `tr*nsl*t*Options` to t** *n* us*r. *n *tt**k*r **n s*t * m*li*ious `tl*`, **usin* t** *pp

Reasoning

T** *or* vuln*r**ility *xists in `**n*r*t*R*qu*stUrl`'s **n*lin* o* t** 'tl*' p*r*m*t*r. T** *ommit *i** s*ows t*is `*un*tion` w*s mo*i*i** to *** TL* v*li**tion usin* * r***x p*tt*rn, *on*irmin* it w*s pr*viously vuln*r**l*. T** `*un*tion` *ir**tly