Description
RSSHub is an open source RSS feed generator. RSSHub is vulnerable to Server-Side Request Forgery (SSRF) attacks. This vulnerability allows an attacker to send arbitrary HTTP requests from the server to other servers or resources on the network. An attacker can exploit this vulnerability by sending a request to the affected routes with a malicious URL. An attacker could also use this vulnerability to send requests to internal or any other servers or resources on the network, potentially gain access to sensitive information that would not normally be accessible and amplifying the impact of the attack. The patch for this issue can be found in commit a66cbcf.
Remediation
References
https://github.com/DIYgod/RSSHub/commit/a66cbcf6eebc700bf97ab097f404f16ab415506a
https://github.com/DIYgod/RSSHub/pull/11588
https://github.com/DIYgod/RSSHub/security/advisories/GHSA-64wp-jh9p-5cg2
Related Vulnerabilities
CVE-2017-16005 Vulnerability in npm package http-signature
CVE-2022-21671 Vulnerability in npm package @replit/crosis
CVE-2020-7788 Vulnerability in maven package org.webjars.npm:ini
CVE-2018-1002200 Vulnerability in maven package org.codehaus.plexus:plexus-archiver
CVE-2012-1833 Vulnerability in maven package org.grails:grails-plugin-controllers