Generated remediation guidance and an executive summary. No account required.
GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. In versions 3.2.0 through 4.1.2, the endpoint `/proxy/?url=` does not properly protect against server-side request forgery. This allows an attacker to port scan internal hosts and request information from internal hosts. A patch is available at commit a9eebae80cb362009660a1fd49e105e7cdb499b9.
Use CWE-918, Geosolutionsgroup vendor hub and Geonode product page to widen CVE-2023-40017 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2023-42439, CVE-2023-28442 and CVE-2023-26043 for nearby disclosures in the same product family.