CVE-2024-43371
CVSS V2 None
CVSS V3 None
Description
CKAN is an open-source data management system for powering data hubs and data portals. There are a number of CKAN plugins, including XLoader, DataPusher, Resource proxy and ckanext-archiver, that work by downloading the contents of local or remote files in order to perform some actions with their contents (e.g. pushing to the DataStore, streaming contents or saving a local copy). All of them use the resource URL, and there are currently no checks to limit what URLs can be requested. This means that a malicious (or unaware) user can create a resource with a URL pointing to a place where they should not have access in order for one of the previous tools to retrieve it (known as a Server Side Request Forgery). Users wanting to protect against these kinds of attacks can use one or a combination of the following approaches: (1) Use a separate HTTP proxy like Squid that can be used to allow / disallow IPs, domains etc as needed, and make CKAN extensions aware of this setting via the ckan.download_proxy config option. (2) Implement custom firewall rules to prevent access to restricted resources. (3) Use custom validators on the resource url field to block/allow certain domains or IPs. All latest versions of the plugins listed above support the ckan.download_proxy settings. Support for this setting in the Resource Proxy plugin was included in CKAN 2.10.5 and 2.11.0.
Overview
- CVE ID
- CVE-2024-43371
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-08-21T14:47:31.160Z
- Last Modified Date
- 2024-08-21T14:47:31.160Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/ckan/ckan/security/advisories/GHSA-g9ph-j5vj-f8wm | x_refsource_CONFIRM |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-43371 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43371 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-08-22 13:16:04 | Added to TrackCVE |