CVE-2023-48711

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-48711
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-48711.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-48711
Aliases
Related
Published
2023-11-24T17:15:07Z
Modified
2025-07-02T00:28:37.537996Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

google-translate-api-browser is an npm package which interfaces with the google translate web api. A Server-Side Request Forgery (SSRF) Vulnerability is present in applications utilizing the google-translate-api-browser package and exposing the translateOptions to the end user. An attacker can set a malicious tld, causing the application to return unsafe URLs pointing towards local resources. The translateOptions.tld field is not properly sanitized before being placed in the Google translate URL. This can allow an attacker with control over the translateOptions to set the tld to a payload such as @127.0.0.1. This causes the full URL to become https://translate.google.@127.0.0.1/..., where translate.google. is the username used to connect to localhost. An attacker can send requests within internal networks and the local host. Should any HTTPS application be present on the internal network with a vulnerability exploitable via a GET call, then it would be possible to exploit this using this vulnerability. This issue has been addressed in release version 4.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/cjvnjde/google-translate-api-browser

Affected ranges

Type
GIT
Repo
https://github.com/cjvnjde/google-translate-api-browser
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v4.*

v4.0.6-alpha