In ArangoDB, versions v3.7.0 through v3.9.0-alpha.1 have a feature which allows downloading a Foxx service from a publicly available URL. This feature does not enforce proper filtering of requests performed internally, which can be abused by a highly-privileged attacker to perform blind SSRF and send internal requests to localhost.
References
Link | Resource |
---|---|
https://github.com/arangodb/arangodb/commit/d7b35a6884c6b2802d34d79fb2a79fb2c9ec2175 | Patch Third Party Advisory |
https://github.com/arangodb/arangodb/commit/d9b7f019d2435f107b19a59190bf9cc27d5f34dd | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25939 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Mend
Published: 2022-02-05T00:00:00
Updated: 2022-02-09T12:15:14
Reserved: 2021-01-22T00:00:00
Link: CVE-2021-25939
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-02-09T13:15:08.447
Modified: 2022-02-11T20:49:32.403
Link: CVE-2021-25939
JSON object: View
Redhat Information
No data.
CWE