Budibase is a low code platform for creating internal tools, workflows, and admin panels. Versions prior to 2.4.3 (07 March 2023) are vulnerable to Server-Side Request Forgery. This can lead to an attacker gaining access to a Budibase AWS secret key. Users of Budibase cloud need to take no action. Self-host users who run Budibase on the public internet and are using a cloud provider that allows HTTP access to metadata information should ensure that when they deploy Budibase live, their internal metadata endpoint is not exposed.
References
Configurations
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Budibase/budibase/commits/develop?after=93d6939466aec192043d8ac842e754f65fdf2e8a+594&branch=develop&qualified_name=refs%2Fheads%2Fdevelop - Patch | |
References | () https://github.com/Budibase/budibase/releases/tag/v2.4.3 - Release Notes | |
References | () https://github.com/Budibase/budibase/security/advisories/GHSA-9xg2-9mcv-985p - Vendor Advisory |
14 Apr 2023, 15:56
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-06 17:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-29010
Mitre link : CVE-2023-29010
CVE.ORG link : CVE-2023-29010
JSON object : View
Products Affected
budibase
- budibase
CWE
CWE-918
Server-Side Request Forgery (SSRF)