Vulnerability Description
SSRF on /proxy in GitHub repository jgraph/drawio prior to 18.0.4. An attacker can make a request as the server and read its contents. This can lead to a leak of sensitive information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Diagrams | Drawio | < 18.0.4 |
Related Weaknesses (CWE)
References
- https://github.com/jgraph/drawio/commit/283d41ec80ad410d68634245cf56114bc19331eePatchThird Party Advisory
- https://huntr.dev/bounties/cad3902f-3afb-4ed2-abd0-9f96a248de11ExploitPatchThird Party Advisory
- https://github.com/jgraph/drawio/commit/283d41ec80ad410d68634245cf56114bc19331eePatchThird Party Advisory
- https://huntr.dev/bounties/cad3902f-3afb-4ed2-abd0-9f96a248de11ExploitPatchThird Party Advisory
FAQ
What is CVE-2022-1713?
CVE-2022-1713 is a vulnerability with a CVSS score of 7.5 (HIGH). SSRF on /proxy in GitHub repository jgraph/drawio prior to 18.0.4. An attacker can make a request as the server and read its contents. This can lead to a leak of sensitive information.
How severe is CVE-2022-1713?
CVE-2022-1713 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1713?
Check the references section above for vendor advisories and patch information. Affected products include: Diagrams Drawio.