Safety vulnerability ID: 72975
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Several CKAN plugins, including XLoader, DataPusher, Resource Proxy, and ckanext-archiver, are vulnerable to SSRF attacks due to a lack of URL validation. Malicious users can exploit these plugins by creating resources with URLs that access unauthorized locations. To mitigate this, users should use an HTTP proxy, implement firewall rules, or apply custom URL validators. The latest plugin versions support the ckan.download_proxy setting.
Latest version: 2.11.2
CKAN Software
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application