Server-Side Request Forgery in @uppy/companion
High severity
GitHub Reviewed
Published
Sep 3, 2020
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Reviewed
Aug 31, 2020
Published to the GitHub Advisory Database
Sep 3, 2020
Last updated
Jan 9, 2023
Versions of
@uppy/companion
prior to 1.9.3 are vulnerable to Server-Side Request Forgery (SSRF). Theget
route passes the user-controlled variablereq.body.url
to a GET request without sanitizing the value. This allows attackers to inject arbitrary URLs and make GET requests on behalf of the server.Recommendation
Upgrade to version 1.9.3 or later.
References