PyPi: Geonode

CVE-2023-42439

Safety vulnerability ID: 63695

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Sep 15, 2023 Updated at Nov 06, 2024
Scan your Python projects for vulnerabilities →

Advisory

Geonode before 4.1.3 is vulnerable to Server-side Request Forgery (SSRF). This could allow a user to request internal services for a full read SSRF, returning any data from the internal network.

Affected package

geonode

Latest version: 4.4.1

Application for serving and sharing geospatial data

Affected versions

Fixed versions

Vulnerability changelog

Security fixes
- [CVE-2023-42439](https://github.com/GeoNode/geonode/security/advisories/GHSA-pxg5-h34r-7q8p)
- [Restricted user information](https://github.com/GeoNode/geonode/pull/11384) returned by the legacy API v1

Docker
- [Reverted base image to Ubuntu 22.04 LTS](https://github.com/GeoNode/geonode/pull/11488)

You can see the **full list of closed PRs [here](https://github.com/GeoNode/geonode/pulls?q=is%3Apr+milestone%3A4.1.3+is%3Aclosed)**.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.5

CVSS v3 Details

MEDIUM 6.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
NONE