Skip to content

Vulnerability allowing for reading internal HTTP resources

High severity GitHub Reviewed Published Mar 12, 2021 in highcharts/node-export-server • Updated Jan 9, 2023

Package

npm highcharts-export-server (npm)

Affected versions

<= 2.0.30

Patched versions

2.1.0

Description

Impact

The vulnerability allows for reading and outputting files served by other services on the internal network in which the export server is hosted. If the export server is exposed to the internet, this potentially allows a malicious user to gain read access to internal web-resources.

The impact is limited to internal services that serve content via. HTTP(S), and requires the attacker to know internal hostnames/IP addresses.

The previous versions have been marked as deprecated on NPM.

Patches

Version 2.1.0 released alongside this security advisory addresses the issue. Please note that this release is not backwards compatible out of the box. See the changelog for details.

Additionally, it's also recommended to upgrade to the latest version of Highcharts to get the added input sanitation implemented in version 9.0 and later.

Workarounds

There are no known workarounds to the issue - an upgrade to version 2.1.0 is required.

For more information

If you have any questions or comments about this advisory:

References

@cvasseng cvasseng published to highcharts/node-export-server Mar 12, 2021
Reviewed Mar 12, 2021
Published to the GitHub Advisory Database Mar 12, 2021
Last updated Jan 9, 2023

Severity

High

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-hfwx-c7q6-g54c

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.