logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2024-41812

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2024-41812

Description:
txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Prior to version 1.7.0, a Server-Side Request Forgery (SSRF) vulnerability in the `/get` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.7.0 prevents displaying the response of forged requests, but the requests can still be sent. For complete mitigation, a firewall between txtdot and other internal network resources should be set.
Last updated date:
09/30/2024
Type:
exploit
Confidence:
HIGH
Date of publishing:
09/30/2024
Reference url to background

https://github.com/TxtDot/txtdot/security/advisories/GHSA-4gj5-xj97-j8fp

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy