There are a number of CKAN plugins, including XLoader, DataPusher, Resource proxy and ckanext-archiver, that work by downloading the contents of local or remote files in order to perform some actions with their contents (e.g. pushing to the DataStore, streaming contents or saving a local copy). All of them use the resource URL, and there are currently no checks to limit what URLs can be requested. This means that a malicious (or unaware) user can create a resource with a URL pointing to a place where they should not have access in order for one of the previous tools to retrieve it (known as a Server Side Request Forgery).
Users wanting to protect against these kinds of attacks can use one or a combination of the following approaches:
ckan.download_proxy
config option. url
field to block/allow certain domains or IPs.All latest versions of the plugins linked above support the ckan.download_proxy
settings. Support for this setting in the Resource Proxy plugin was included in CKAN 2.10.5 and 2.11.0
{ "nvd_published_at": "2024-08-21T15:15:09Z", "cwe_ids": [ "CWE-918" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-08-21T18:27:11Z" }