First published: Thu Aug 24 2023(Updated: )
GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. In versions 3.2.0 through 4.1.2, the endpoint `/proxy/?url=` does not properly protect against server-side request forgery. This allows an attacker to port scan internal hosts and request information from internal hosts. A patch is available at commit a9eebae80cb362009660a1fd49e105e7cdb499b9.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Geosolutionsgroup Geonode | >=3.2.0<=4.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40017 is a vulnerability in GeoNode that allows server-side request forgery, potentially enabling an attacker to port scan internal hosts and request internal resources.
GeoNode is an open source platform for creating, sharing, and collaborating on geospatial data.
Versions 3.2.0 through 4.1.2 of GeoNode are affected by CVE-2023-40017.
CVE-2023-40017 has a severity rating of high (7.5).
To fix CVE-2023-40017, it is recommended to update GeoNode to a version that includes the fix or apply the necessary patch provided by the product vendor.