Skip to content

Server-Side Request Forgery in @uppy/companion

High severity GitHub Reviewed Published Sep 3, 2020 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm @uppy/companion (npm)

Affected versions

< 1.9.3

Patched versions

1.9.3

Description

Versions of @uppy/companion prior to 1.9.3 are vulnerable to Server-Side Request Forgery (SSRF). The get route passes the user-controlled variable req.body.url to a GET request without sanitizing the value. This allows attackers to inject arbitrary URLs and make GET requests on behalf of the server.

Recommendation

Upgrade to version 1.9.3 or later.

References

Reviewed Aug 31, 2020
Published to the GitHub Advisory Database Sep 3, 2020
Last updated Jan 9, 2023

Severity

High

EPSS score

0.431%
(74th percentile)

Weaknesses

CVE ID

CVE-2020-8135

GHSA ID

GHSA-mm7r-265w-jv6f

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.