CRITICALCVE-2023-5572CVSS 10

Server-Side Request Forgery (SSRF) dans vriteio/vrite

Plateforme

nodejs

Composant

vriteio/vrite

Corrigé dans

0.3.0

AI Confidence: highNVDEPSS 0.3%Révisé: mai 2026
Traduction vers votre langue…

CVE-2023-5572 describes a critical Server-Side Request Forgery (SSRF) vulnerability discovered in the vriteio/vrite Node.js library. This flaw allows attackers to induce the server to make requests to unintended locations, potentially exposing sensitive internal resources or performing actions on behalf of the server. The vulnerability affects versions of vriteio/vrite prior to 0.3.0, and a patch has been released.

Impact et Scénarios d'Attaquetraduction en cours…

The SSRF vulnerability in vriteio/vrite poses a significant risk because it allows attackers to bypass security controls and access resources that should be inaccessible. An attacker could leverage this to scan internal networks, access cloud metadata services (potentially revealing credentials), or even interact with internal APIs. The impact can range from information disclosure to complete system compromise, depending on the resources accessible through the SSRF. This vulnerability is particularly concerning in environments where vriteio/vrite is used to process external data or interact with other services.

Contexte d'Exploitationtraduction en cours…

CVE-2023-5572 was publicly disclosed on 2023-10-13. While no active exploitation campaigns have been publicly confirmed, the CRITICAL severity and ease of exploitation make it a high-priority target. No public proof-of-concept code has been released, but the SSRF nature of the vulnerability suggests that exploitation is relatively straightforward. The vulnerability is not currently listed on the CISA KEV catalog.

Qui Est à Risquetraduction en cours…

Applications and services that utilize the vriteio/vrite Node.js library, particularly those handling external data or interacting with internal APIs, are at risk. This includes projects relying on vriteio/vrite for data processing or integration with other services. Shared hosting environments where vriteio/vrite is a dependency of a larger application are also vulnerable.

Étapes de Détectiontraduction en cours…

• nodejs / server:

  npm list vriteio/vrite

• nodejs / server:

  npm audit vriteio/vrite

• nodejs / server: Check process arguments for suspicious URLs being passed to vriteio/vrite.

Chronologie de l'Attaque

  1. Disclosure

    disclosure

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetÉlevée

EPSS

0.27% (percentile 50%)

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H10.0CRITICALAttack VectorNetworkComment l'attaquant atteint la cibleAttack ComplexityLowConditions requises pour exploiterPrivileges RequiredNoneNiveau d'authentification requisUser InteractionNoneSi une action de la victime est requiseScopeChangedImpact au-delà du composant affectéConfidentialityHighRisque d'exposition de données sensiblesIntegrityHighRisque de modification non autorisée de donnéesAvailabilityHighRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
Attack Complexity
Faible — aucune condition spéciale requise. Exploitable de manière fiable.
Privileges Required
Aucun — sans authentification. Aucune identifiant requis pour exploiter.
User Interaction
Aucune — attaque automatique et silencieuse. La victime ne fait rien.
Scope
Modifié — l'attaque peut pivoter au-delà du composant vulnérable.
Confidentiality
Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
Integrity
Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
Availability
Élevé — panne complète ou épuisement des ressources. Déni de service total.

Logiciel Affecté

Composantvriteio/vrite
Fournisseurvriteio
Plage affectéeCorrigé dans
0.1.0 – 0.2.30.3.0

Classification de Faiblesse (CWE)

Chronologie

  1. Réservé
  2. Publiée
  3. Modifiée
  4. EPSS mis à jour

Mitigation et Contournementstraduction en cours…

The primary mitigation for CVE-2023-5572 is to immediately upgrade to version 0.3.0 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing temporary workarounds. These may include restricting outbound network access for the vriteio/vrite process using a firewall or proxy, and carefully validating and sanitizing any URLs provided to the library. Monitor network traffic for unusual outbound requests originating from the vriteio/vrite process. After upgrading, confirm the fix by attempting to trigger an SSRF request and verifying that it is blocked.

Comment corriger

Mettez à jour la version de vriteio/vrite à la 0.3.0 ou supérieure. Cette version corrige la vulnérabilité SSRF. Vous pouvez mettre à jour le paquet en utilisant npm ou yarn selon votre configuration de projet.

Newsletter Sécurité CVE

Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.

Questions fréquentestraduction en cours…

What is CVE-2023-5572 — SSRF in vriteio/vrite?

CVE-2023-5572 is a critical Server-Side Request Forgery (SSRF) vulnerability in the vriteio/vrite Node.js library, allowing attackers to make requests to unintended locations.

Am I affected by CVE-2023-5572 in vriteio/vrite?

You are affected if you are using vriteio/vrite versions prior to 0.3.0. Check your project dependencies to determine if you are vulnerable.

How do I fix CVE-2023-5572 in vriteio/vrite?

Upgrade to vriteio/vrite version 0.3.0 or later. If immediate upgrade is not possible, implement temporary workarounds like restricting outbound network access.

Is CVE-2023-5572 being actively exploited?

While no active exploitation campaigns have been publicly confirmed, the CRITICAL severity makes it a high-priority target for attackers.

Where can I find the official vriteio advisory for CVE-2023-5572?

Refer to the vriteio GitHub repository for updates and advisories: https://github.com/vriteio/vrite

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.