{"id":"CVE-2023-42439","summary":"GeoNode SSRF Bypass to return internal host data","details":"GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. A SSRF vulnerability exists starting in version 3.2.0, bypassing existing controls on the software. This can allow a user to request internal services for a full read SSRF, returning any data from the internal network. The application is using a whitelist, but the whitelist can be bypassed. The bypass will trick the application that the first host is a whitelisted address, but the browser will use `@` or `%40` as a credential to the host geoserver on port 8080, this will return the data to that host on the response. Version 4.1.3.post1 is the first available version that contains a patch.","aliases":["GHSA-pxg5-h34r-7q8p","PYSEC-2023-176"],"modified":"2026-04-10T05:01:55.464612Z","published":"2023-09-15T20:22:19.102Z","database_specific":{"cwe_ids":["CWE-918"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/42xxx/CVE-2023-42439.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/GeoNode/geonode/releases/tag/4.1.3"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/42xxx/CVE-2023-42439.json"},{"type":"ADVISORY","url":"https://github.com/GeoNode/geonode/security/advisories/GHSA-pxg5-h34r-7q8p"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42439"},{"type":"FIX","url":"https://github.com/GeoNode/geonode/commit/79ac6e70419c2e0261548bed91c159b54ff35b8d"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/geonode/geonode","events":[{"introduced":"d120dfe19303bf73e384352c2c1913993b2bff72"},{"fixed":"79ac6e70419c2e0261548bed91c159b54ff35b8d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-42439.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}