CVE-2024-27927

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27927
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27927.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27927
Aliases
Related
Published
2024-03-21T02:52:21Z
Modified
2025-01-08T02:47:21Z
Summary
[none]
Details

RSSHub is an open source RSS feed generator. Prior to version 1.0.0-master.a429472, RSSHub allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network or conduct Denial-of-Service (DoS) attacks. The attacker can send malicious requests to a RSSHub server, to make the server send HTTP GET requests to arbitrary destinations and see partial responses. This may lead to leak the server IP address, which could be hidden behind a CDN; retrieving information in the internal network, e.g. which addresses/ports are accessible, the titles and meta descriptions of HTML pages; and denial of service amplification. The attacker could request the server to download some large files, or chain several SSRF requests in a single attacker request.

References

Affected packages

Git / github.com/diygod/rsshub

Affected ranges

Type
GIT
Repo
https://github.com/diygod/rsshub
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed