txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Prior to version 1.7.0, a Server-Side Request Forgery (SSRF) vulnerability in the `/get` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.7.0 prevents displaying the response of forged requests, but the requests can still be sent. For complete mitigation, a firewall between txtdot and other internal network resources should be set.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Txtdot
Txtdot txtdot |
|
CPEs | cpe:2.3:a:txtdot:txtdot:*:*:*:*:*:*:*:* | |
Vendors & Products |
Txtdot
Txtdot txtdot |
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-07-26T16:49:52.343Z
Updated: 2024-08-02T04:46:52.687Z
Reserved: 2024-07-22T13:57:37.136Z
Link: CVE-2024-41812
Vulnrichment
Updated: 2024-08-02T04:46:52.687Z
NVD
Status : Modified
Published: 2024-07-26T17:15:12.783
Modified: 2024-11-21T09:33:07.407
Link: CVE-2024-41812
Redhat
No data.