txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Prior to version 1.7.0, a Server-Side Request Forgery (SSRF) vulnerability in the `/get` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.7.0 prevents displaying the response of forged requests, but the requests can still be sent. For complete mitigation, a firewall between txtdot and other internal network resources should be set.
References
Configurations
History
30 Sep 2024, 20:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/TxtDot/txtdot/blob/a7fdaf80fdf45abefe83b2eb5135ba112142dc74/src/handlers/distributor.ts#L43-L47 - Patch | |
References | () https://github.com/TxtDot/txtdot/commit/7c72d985f7a26ec1fd3cf628444717ca54986d2d - Patch | |
References | () https://github.com/TxtDot/txtdot/security/advisories/GHSA-4gj5-xj97-j8fp - Exploit, Third Party Advisory | |
First Time |
Txtdot txtdot
Txtdot |
|
CPE | cpe:2.3:a:txtdot:txtdot:*:*:*:*:*:*:*:* |
29 Jul 2024, 14:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-26 17:15
Updated : 2024-09-30 20:05
NVD link : CVE-2024-41812
Mitre link : CVE-2024-41812
CVE.ORG link : CVE-2024-41812
JSON object : View
Products Affected
txtdot
- txtdot
CWE
CWE-918
Server-Side Request Forgery (SSRF)