** UNSUPPORTED WHEN ASSIGNED ** The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
| Link | Resource |
|---|---|
| https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf | Exploit Patch Technical Description Third Party Advisory |
| https://github.com/request/request/issues/3442 | Exploit Issue Tracking Patch Technical Description Vendor Advisory |
| https://github.com/request/request/pull/3444 | Patch |
| https://security.netapp.com/advisory/ntap-20230413-0007/ | |
| https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf | Exploit Patch Technical Description Third Party Advisory |
| https://github.com/request/request/issues/3442 | Exploit Issue Tracking Patch Technical Description Vendor Advisory |
| https://github.com/request/request/pull/3444 | Patch |
| https://security.netapp.com/advisory/ntap-20230413-0007/ |
Configurations
History
21 Nov 2024, 07:54
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf - Exploit, Patch, Technical Description, Third Party Advisory | |
| References | () https://github.com/request/request/issues/3442 - Exploit, Issue Tracking, Patch, Technical Description, Vendor Advisory | |
| References | () https://github.com/request/request/pull/3444 - Patch | |
| References | () https://security.netapp.com/advisory/ntap-20230413-0007/ - |
22 Mar 2023, 19:32
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:request_project:request:*:*:*:*:*:node.js:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| CWE | CWE-918 | |
| References | (MISC) https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf - Exploit, Patch, Technical Description, Third Party Advisory | |
| References | (MISC) https://github.com/request/request/issues/3442 - Exploit, Issue Tracking, Patch, Technical Description, Vendor Advisory | |
| References | (MISC) https://github.com/request/request/pull/3444 - Patch |
16 Mar 2023, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-03-16 15:15
Updated : 2024-11-21 07:54
NVD link : CVE-2023-28155
Mitre link : CVE-2023-28155
CVE.ORG link : CVE-2023-28155
JSON object : View
Products Affected
request_project
- request
CWE
CWE-918
Server-Side Request Forgery (SSRF)
