CVE-2024-27927:
RSSHub vulnerable to Server-Side Request Forgery
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.71138%
CWE
Published
3/6/2024
Updated
3/21/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
rsshub | npm | < 1.0.0-master.a429472 | 1.0.0-master.a429472 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from three key functions:
- In /m4 route: User-controlled 'id' was directly interpolated into the domain (${id}.m4.cn) without validation, as shown in pre-patch code.
- In mastodon utils: getAccountIdByAcct allowed user-supplied domains via acct parameter to construct API endpoints without proper allowlist checks when MASTODON_API_HOST wasn't configured.
- In /zjol route: The 'id' parameter was used to build https://${id}.zjol.com.cn without validation. All three patterns enable SSRF by letting attackers control the target domain in HTTP requests. The patches (added isValidHost check for /m4, moved validation to utils for mastodon) confirm these were the vulnerable points.