Lucene search

K
cve[email protected]CVE-2023-41055
HistorySep 04, 2023 - 6:15 p.m.

CVE-2023-41055

2023-09-0418:15:09
CWE-918
web.nvd.nist.gov
10
cve-2023-41055
librey
ssrf vulnerability
meta search engine
privacy
dos attacks
http get requests

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

36.0%

LibreY is a fork of LibreX, a framework-less and javascript-free privacy respecting meta search engine. LibreY is subject to a Server-Side Request Forgery (SSRF) vulnerability in the engines/google/text.php and engines/duckduckgo/text.php files in versions before commit be59098abd119cda70b15bf3faac596dfd39a744. This vulnerability allows remote attackers to request the server to send HTTP GET requests to arbitrary targets and conduct Denial-of-Service (DoS) attacks via the wikipedia_language cookie. Remote attackers can request the server to download large files to reduce the performance of the server or even deny access from legitimate users. This issue has been patched in https://github.com/Ahwxorg/LibreY/pull/9. LibreY hosters are advised to use the latest commit. There are no known workarounds for this vulnerability.

Affected configurations

NVD
Node
ahwxlibreyRange<2023-08-17
CPENameOperatorVersion
ahwx:libreyahwx libreylt2023-08-17

CNA Affected

[
  {
    "vendor": "Ahwxorg",
    "product": "LibreY",
    "versions": [
      {
        "version": "< be59098abd119cda70b15bf3faac596dfd39a744",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

36.0%

Related for CVE-2023-41055