SSRF on /proxy in GitHub repository jgraph/drawio prior to 18.0.4. An attacker can make a request as the server and read its contents. This can lead to a leak of sensitive information.
References
Link | Resource |
---|---|
https://github.com/jgraph/drawio/commit/283d41ec80ad410d68634245cf56114bc19331ee | Patch Third Party Advisory |
https://huntr.dev/bounties/cad3902f-3afb-4ed2-abd0-9f96a248de11 | Exploit Patch Third Party Advisory |
Configurations
History
25 May 2022, 02:26
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-918 | |
References | (CONFIRM) https://huntr.dev/bounties/cad3902f-3afb-4ed2-abd0-9f96a248de11 - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/jgraph/drawio/commit/283d41ec80ad410d68634245cf56114bc19331ee - Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CPE | cpe:2.3:a:diagrams:draw.io:*:*:*:*:*:*:*:* |
16 May 2022, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-16 15:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-1713
Mitre link : CVE-2022-1713
CVE.ORG link : CVE-2022-1713
JSON object : View
Products Affected
diagrams
- drawio
CWE
CWE-918
Server-Side Request Forgery (SSRF)