Impact
A validation bug allows an attacker to proxy domains not explicitly allowed in the proxyableDomains configuration.
The validation only checks if a hostname ended with an allowed domain. This meant:
If example.com is allowed in proxyableDomains:
- ✅ example.com is allowed (correct)
- ✅ api.example.com is allowed (correct)
- ⚠️ maliciousexample.com is allowed (incorrect)
An attacker could register maliciousexample.com and proxy content through terriajs-server, bypassing proxy restrictions.
Patches
All versions up to 4.0.2 are affected. Upgrade to 4.0.3 to address the vulnerability.
Impact
A validation bug allows an attacker to proxy domains not explicitly allowed in the
proxyableDomainsconfiguration.The validation only checks if a hostname ended with an allowed domain. This meant:
If
example.comis allowed inproxyableDomains:An attacker could register maliciousexample.com and proxy content through
terriajs-server, bypassing proxy restrictions.Patches
All versions up to 4.0.2 are affected. Upgrade to 4.0.3 to address the vulnerability.