脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
Server-Side Request Forgery (SSRF) Vulnerability in google-translate-api-browser
脆弱性説明
google-translate-api-browser is an npm package which interfaces with the google translate web api. A Server-Side Request Forgery (SSRF) Vulnerability is present in applications utilizing the `google-translate-api-browser` package and exposing the `translateOptions` to the end user. An attacker can set a malicious `tld`, causing the application to return unsafe URLs pointing towards local resources. The `translateOptions.tld` field is not properly sanitized before being placed in the Google translate URL. This can allow an attacker with control over the `translateOptions` to set the `tld` to a payload such as `@127.0.0.1`. This causes the full URL to become `https://translate.google.@127.0.0.1/...`, where `translate.google.` is the username used to connect to localhost. An attacker can send requests within internal networks and the local host. Should any HTTPS application be present on the internal network with a vulnerability exploitable via a GET call, then it would be possible to exploit this using this vulnerability. This issue has been addressed in release version 4.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS情報
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
脆弱性タイプ
服务端请求伪造(SSRF)
脆弱性タイトル
google-translate-api-browser 代码问题漏洞
脆弱性説明
google-translate-api-browser是免费且无限制的 Google 翻译 API。 google-translate-api-browser 4.1.0之前版本存在代码问题漏洞,该漏洞源于translateOptions.tld字段在放入Google翻译URL之前未经过正确清理。攻击者利用该漏洞可以设置恶意tld,从而导致应用程序返回不安全的URL。
CVSS情報
N/A
脆弱性タイプ
N/A