Skip to main content

Server-Side Request Forgery (SSRF)


Severity Low
Score 3.7/10


google-translate-api-browser is an npm package that interfaces with the Google translate web API. A Server-Side Request Forgery (SSRF) Vulnerability is present in applications utilizing the `google-translate-api-browser` package and exposing the `translateOptions` to the end user. An attacker can set a malicious `tld`, causing the application to return unsafe URLs pointing towards local resources. The `translateOptions.tld` field is not properly sanitized before being placed in the Google Translate URL. This can allow an attacker with control over the `translateOptions` to set the `tld` to a payload such as `@`. This causes the full URL to become `https://[email protected]/...`, where `` is the username used to connect to localhost. An attacker can send requests within internal networks and the local host. Should any HTTPS application be present on the internal network with a vulnerability exploitable via a GET call, then it would be possible to exploit this using this vulnerability. This issue affects versions prior to 4.1.3.

  • HIGH
  • LOW
  • NONE
  • NONE
  • NONE
  • NONE

CWE-918 - Server-Side Request Forgery (SSRF)

Server-side request forgery (SSRF) is a weakness that allows an attacker to send an arbitrary request, making it appear that the request was sent by the server. This request may bypass a firewall that would normally prevent direct access to the URL. The impact of this vulnerability can vary from unauthorized access to files and sensitive information to remote code execution.


Advisory Timeline

  • Published