Miggo Logo

GHSA-86q5-qcjc-7pv4: Presto JDBC Server-Side Request Forgery by nextUri

7.6

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
10/3/2023
Updated
10/3/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.facebook.presto:presto-jdbcmaven<= 0.283

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability documentation explicitly identifies StatementClientV1.advance() as the location where nextUri values are processed. The function's role in handling the query execution flow and making subsequent HTTP requests based on unvalidated server-provided URIs directly enables SSRF. The PoC demonstrates how controlling the nextUri parameter leads to internal network requests, confirming this function's critical role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry Pr*sto J*** is vuln*r**l* to S*rv*r-Si** R*qu*st *or**ry (SSR*) w**n *onn**tin* * r*mot* Pr*sto s*rv*r. *n *tt**k*r **n mo*i*y t** n*xtUri p*r*m*t*r to int*rn*l s*rv*r in r*spons* *ont*nt t**t Pr*sto J*** *li*nt will r*qu*st n*xt *n* vi*

Reasoning

T** vuln*r**ility *o*um*nt*tion *xpli*itly i**nti*i*s `St*t*m*nt*li*ntV*.**v*n**()` *s t** lo**tion w**r* n*xtUri v*lu*s *r* pro**ss**. T** *un*tion's rol* in **n*lin* t** qu*ry *x**ution *low *n* m*kin* su*s*qu*nt *TTP r*qu*sts **s** on unv*li**t**