First published: Fri Apr 19 2024(Updated: )
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/image that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability. Version 0.22.0 of memos removes the vulnerable file.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/usememos/memos | <0.22.0 | 0.22.0 |
Usememos Memos | <0.22.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29029 is rated with a high severity due to its ability to facilitate unauthorized access and enumeration of internal network resources.
To fix CVE-2024-29029, upgrade to memos version 0.22.0 or later, where the vulnerability has been patched.
CVE-2024-29029 is an SSRF (Server-Side Request Forgery) vulnerability affecting the memos note-taking service.
Users of memos versions prior to 0.22.0 are affected by CVE-2024-29029.
Yes, CVE-2024-29029 can be exploited by unauthenticated users, allowing them to enumerate the internal network.