code-server is vulnerable to Server-Side Request Forgery (SSRF)
65
Medium Risk
Affected versions of this package fail to properly validate that ports in the path proxy are numerical, allowing an attacker to manipulate the proxy target. The vulnerable code constructs a proxy URL without sanitizing req.params.port, enabling an attacker to inject malicious input (e.g., a domain instead of a port) and redirect traffic to an arbitrary domain. It could lead to server-side request forgery (SSRF) or data exfiltration by proxying traffic to an attacker-controlled server.
You are affected if you are using a version that falls within the vulnerable range.
code-server is vulnerable to Server-Side Request Forgery (SSRF) in versions 4.93.1 - 4.99.3.
Upgrade the code-server library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant