Description
RSSHub is an open source RSS feed generator. RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network. An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. An attacker could also use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack. The patch for this issue can be found in commit a66cbcf.
Remediation
References
https://github.com/DIYgod/RSSHub/commit/a66cbcf6eebc700bf97ab097f404f16ab415506a
https://github.com/DIYgod/RSSHub/pull/11588
https://github.com/DIYgod/RSSHub/security/advisories/GHSA-64wp-jh9p-5cg2
Related Vulnerabilities
CVE-2023-40828 Vulnerability in maven package org.pf4j:pf4j
CVE-2022-35915 Vulnerability in npm package openzeppelin-solidity
CVE-2023-36665 Vulnerability in npm package protobufjs
CVE-2022-39299 Vulnerability in npm package @node-saml/node-saml
CVE-2019-18212 Vulnerability in maven package org.lsp4xml:lsp4xml-extensions