CVE-2024-43371 – Potential access to sensitive URLs via CKAN extensions (SSRF)
https://notcve.org/view.php?id=CVE-2024-43371
CKAN is an open-source data management system for powering data hubs and data portals. There are a number of CKAN plugins, including XLoader, DataPusher, Resource proxy and ckanext-archiver, that work by downloading the contents of local or remote files in order to perform some actions with their contents (e.g. pushing to the DataStore, streaming contents or saving a local copy). All of them use the resource URL, and there are currently no checks to limit what URLs can be requested. This means that a malicious (or unaware) user can create a resource with a URL pointing to a place where they should not have access in order for one of the previous tools to retrieve it (known as a Server Side Request Forgery). Users wanting to protect against these kinds of attacks can use one or a combination of the following approaches: (1) Use a separate HTTP proxy like Squid that can be used to allow / disallow IPs, domains etc as needed, and make CKAN extensions aware of this setting via the ckan.download_proxy config option. (2) Implement custom firewall rules to prevent access to restricted resources. (3) Use custom validators on the resource url field to block/allow certain domains or IPs. • https://github.com/ckan/ckan/security/advisories/GHSA-g9ph-j5vj-f8wm • CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2024-41675 – CKAN has a Cross-site Scripting vector in the Datatables view plugin
https://notcve.org/view.php?id=CVE-2024-41675
CKAN is an open-source data management system for powering data hubs and data portals. The Datatables view plugin did not properly escape record data coming from the DataStore, leading to a potential XSS vector. Sites running CKAN >= 2.7.0 with the datatables_view plugin activated. This is a plugin included in CKAN core, that not activated by default but it is widely used to preview tabular data. This vulnerability has been fixed in CKAN 2.10.5 and 2.11.0. • https://github.com/ckan/ckan/commit/9e89ce8220ab1445e0bd85a67994a51d9d3d2688 https://github.com/ckan/ckan/commit/d7dfe8c427b1c63c75d788a609f3b7d7620a25a1 https://github.com/ckan/ckan/security/advisories/GHSA-r3jc-vhf4-6v32 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-41674 – CKAN may leak Solr credentials via error message in package_search action
https://notcve.org/view.php?id=CVE-2024-41674
CKAN is an open-source data management system for powering data hubs and data portals. If there were connection issues with the Solr server, the internal Solr URL (potentially including credentials) could be leaked to package_search calls as part of the returned error message. This has been patched in CKAN 2.10.5 and 2.11.0. • https://github.com/ckan/ckan/commit/f6b032cd7082d784938165bbd113557639002ca7 https://github.com/ckan/ckan/security/advisories/GHSA-2rqw-cfhc-35fh • CWE-209: Generation of Error Message Containing Sensitive Information •
CVE-2024-27097 – Potential log injection in reset user endpoint in ckan
https://notcve.org/view.php?id=CVE-2024-27097
A user endpoint didn't perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format. This has been fixed in the CKAN versions 2.9.11 and 2.10.4. Users are advised to upgrade. Users unable to upgrade should override the `/user/reset` endpoint to filter the `id` parameter in order to exclude newlines. • https://github.com/ckan/ckan/commit/81b56c55e5e3651d7fcf9642cd5a489a9b62212c https://github.com/ckan/ckan/security/advisories/GHSA-8g38-3m6v-232j • CWE-532: Insertion of Sensitive Information into Log File •