Description
txtdot is an HTTP proxy that parses only text, links, and pictures from pages, removing ads and heavy scripts. Starting in version 1.4.0 and prior to version 1.6.1, a Server-Side Request Forgery (SSRF) vulnerability in the `/proxy` route of txtdot allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network. Version 1.6.1 patches the issue.
References (3)
Core 3
Core References
Exploit, Third Party Advisory x_refsource_confirm
https://github.com/TxtDot/txtdot/security/advisories/GHSA-4c78-229v-hf6m
Patch x_refsource_misc
https://github.com/TxtDot/txtdot/commit/f241a46e05b148a39b84bf956051b5aaa489949e
Scores
CVSS v3
7.5
EPSS
0.0033
EPSS Percentile
55.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-918
Status
published
Products (1)
txtdot/txtdot
1.4.0 - 1.6.1
Published
Jul 26, 2024
Tracked Since
Feb 18, 2026