Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS02N200LXF4cDMtajZoaM4AA486

TrueLayer.Client SSRF when fetching payment or payment provider

Impact

The vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure.

Patches

Versions of TrueLayer.Client v1.6.0 and later are not affected.

Workarounds

The issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the TrueLayer.Client library.

Permalink: https://github.com/advisories/GHSA-67m4-qxp3-j6hh
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02N200LXF4cDMtajZoaM4AA486
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 3 months ago
Updated: 3 months ago


CVSS Score: 8.6
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Identifiers: GHSA-67m4-qxp3-j6hh, CVE-2024-23838
References: Repository: https://github.com/TrueLayer/truelayer-dotnet
Blast Radius: 1.0

Affected Packages

nuget:TrueLayer.Client
Dependent packages: 0
Dependent repositories: 0
Downloads: 19,031 total
Affected Version Ranges: < 1.6.0
Fixed in: 1.6.0
All affected versions: 0.1.0, 0.1.1, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 1.0.0, 1.1.0, 1.2.0, 1.2.1, 1.3.0, 1.3.1, 1.3.2, 1.4.0, 1.5.0
All unaffected versions: 1.6.0, 1.6.1