Protecting Against Server Side Request Forgery (SSRF) in CKAN
CVE-2024-43371
Key Information:
- Vendor
- Ckan
- Status
- Ckan
- Vendor
- CVE Published:
- 21 August 2024
Summary
The CKAN data management system and its associated plugins, including XLoader, DataPusher, and Resource Proxy, allow unrestricted URL requests, creating a potential vulnerability for Server Side Request Forgery (SSRF) attacks. Attackers or unsuspecting users can craft requests to unauthorized resources by specifying malicious URLs. This issue arises because CKAN does not impose existing checks on resource URLs, enabling the possibility of accessing prohibited areas. To mitigate these risks, users are advised to implement a range of security strategies, including deploying separate HTTP proxies, creating custom firewall rules, and utilizing resource URL field validators. Recent updates to CKAN plugins include support for configurations that address the download proxy settings, enhancing security against unauthorized URL access.
Affected Version(s)
ckan < 2.10.5
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved