The cBioPortal for Cancer Genomics provides visualization, analysis, and download of large-scale cancer genomics data sets. When running a publicly exposed proxy endpoint without authentication, cBioPortal could allow someone to perform a Server Side Request Forgery (SSRF) attack. Logged in users could do the same on private instances. A fix has been released in version 6.0.12. As a workaround, one might be able to disable `/proxy` endpoint entirely via, for example, nginx.
References
Configurations
No configuration.
History
21 Nov 2024, 09:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5 - | |
References | () https://github.com/cBioPortal/cbioportal/pull/10884 - | |
References | () https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12 - | |
References | () https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm - | |
References | () https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004 - |
24 Jul 2024, 12:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
23 Jul 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-23 19:15
Updated : 2024-11-21 09:32
NVD link : CVE-2024-41668
Mitre link : CVE-2024-41668
CVE.ORG link : CVE-2024-41668
JSON object : View
Products Affected
No product.
CWE
CWE-918
Server-Side Request Forgery (SSRF)