CVE-2024-42352Server-Side Request Forgery in Icon

Severity
7.5HIGHNVD
EPSS
0.1%
top 75.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 5

Description

Nuxt is a free and open-source framework to create full-stack web applications and websites with Vue.js. `nuxt/icon` provides an API to allow client side icon lookup. This endpoint is at `/api/_nuxt_icon/[name]`. The proxied request path is improperly parsed, allowing an attacker to change the scheme and host of the request. This leads to SSRF, and could potentially lead to sensitive data exposure. The `new URL` constructor is used to parse the final path. This constructor can be passed a relati

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5nuxt/icon< 1.4.5
npmnuxt/icon< 1.4.5
NVDnuxt/nuxt< 1.4.5

🔴Vulnerability Details

2
OSV
Nuxt Icon affected by a Server-Side Request Forgery (SSRF)2024-08-05
GHSA
Nuxt Icon affected by a Server-Side Request Forgery (SSRF)2024-08-05