漏洞标题
在谷歌翻译API浏览器中的服务器端请求伪造(SSRF)漏洞
漏洞描述信息
google-translate-api-browser中的服务器端请求伪造(SSRF)漏洞
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
漏洞类别
服务端请求伪造(SSRF)
漏洞标题
Server-Side Request Forgery (SSRF) Vulnerability in google-translate-api-browser
漏洞描述信息
google-translate-api-browser is an npm package which interfaces with the google translate web api. A Server-Side Request Forgery (SSRF) Vulnerability is present in applications utilizing the `google-translate-api-browser` package and exposing the `translateOptions` to the end user. An attacker can set a malicious `tld`, causing the application to return unsafe URLs pointing towards local resources. The `translateOptions.tld` field is not properly sanitized before being placed in the Google translate URL. This can allow an attacker with control over the `translateOptions` to set the `tld` to a payload such as `@127.0.0.1`. This causes the full URL to become `https://translate.google.@127.0.0.1/...`, where `translate.google.` is the username used to connect to localhost. An attacker can send requests within internal networks and the local host. Should any HTTPS application be present on the internal network with a vulnerability exploitable via a GET call, then it would be possible to exploit this using this vulnerability. This issue has been addressed in release version 4.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS信息
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
漏洞类别
服务端请求伪造(SSRF)
漏洞标题
google-translate-api-browser 代码问题漏洞
漏洞描述信息
google-translate-api-browser是免费且无限制的 Google 翻译 API。 google-translate-api-browser 4.1.0之前版本存在代码问题漏洞,该漏洞源于translateOptions.tld字段在放入Google翻译URL之前未经过正确清理。攻击者利用该漏洞可以设置恶意tld,从而导致应用程序返回不安全的URL。
CVSS信息
N/A
漏洞类别
代码问题