memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/image that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability. Version 0.22.0 of memos removes the vulnerable file.
References
Configurations
History
02 Jan 2025, 20:46
Type | Values Removed | Values Added |
---|---|---|
First Time |
Usememos
Usememos memos |
|
CPE | cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:* | |
References | () https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/http_getter.go#L29 - Product | |
References | () https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5 - Patch | |
References | () https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/ - Exploit, Third Party Advisory |
Information
Published : 2024-04-19 16:15
Updated : 2025-01-02 20:46
NVD link : CVE-2024-29029
Mitre link : CVE-2024-29029
CVE.ORG link : CVE-2024-29029
JSON object : View
Products Affected
usememos
- memos