Skip to content

Semi-blind SSRF

Moderate
Philip-Larsen-Donnelly published GHSA-6qh9-rxc8-7943 Dec 8, 2022

Package

dhis2-core (none)

Affected versions

2.34, 2.35, 2.36, 2.37, 2.38, 2.39

Patched versions

2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1

Description

Impact

An authenticated DHIS2 user can craft a request to DHIS2 to instruct the server to make requests to external resources (like third party servers). This could allow an attacker, for example, to identify vulnerable services which might not be otherwise exposed to the public internet or to determine whether a specific file is present on the DHIS2 server.

Patches

DHIS2 administrators should upgrade to the following hotfix releases:

  • 2.36.12.1
  • 2.37.8.1
  • 2.38.2.1
  • 2.39.0.1

Workarounds

At this time, there is no known workaround or mitigation for this vulnerability.

References

For more information

If you have any questions or comments about this advisory, email us at [email protected].

Severity

Moderate

CVE ID

CVE-2022-41949

Weaknesses

No CWEs