{"id":"CVE-2023-40017","summary":"Geonode Server Side Request Forgery vulnerability","details":"GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. In versions 3.2.0 through 4.1.2, the endpoint `/proxy/?url=` does not properly protect against server-side request forgery. This allows an attacker to port scan internal hosts and request information from internal hosts. A patch is available at commit a9eebae80cb362009660a1fd49e105e7cdb499b9.","aliases":["GHSA-rmxg-6qqf-x8mr","PYSEC-2023-269"],"modified":"2026-04-10T05:00:34.971829Z","published":"2023-08-24T22:45:48.502Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/40xxx/CVE-2023-40017.json","cwe_ids":["CWE-918"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/40xxx/CVE-2023-40017.json"},{"type":"ADVISORY","url":"https://github.com/GeoNode/geonode/security/advisories/GHSA-rmxg-6qqf-x8mr"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40017"},{"type":"FIX","url":"https://github.com/GeoNode/geonode/commit/a9eebae80cb362009660a1fd49e105e7cdb499b9"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/geonode/geonode","events":[{"introduced":"d120dfe19303bf73e384352c2c1913993b2bff72"},{"fixed":"a9eebae80cb362009660a1fd49e105e7cdb499b9"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-40017.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}