Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1nY2o3LWo0MzgtaGpqMs05RQ

Smokescreen SSRF via deny list bypass

The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure.

Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by appending a dot to the end of user-supplied URLs, or by providing input in a different letter case.

Recommendation

Upgrade Smokescreen to version 0.0.3 or later.

Acknowledgements

Thanks to Grzegorz Niedziela for reporting the issue.

For more information

Email us at [email protected]

Permalink: https://github.com/advisories/GHSA-gcj7-j438-hjj2
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nY2o3LWo0MzgtaGpqMs05RQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: over 1 year ago


CVSS Score: 5.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

Identifiers: GHSA-gcj7-j438-hjj2, CVE-2022-24825
References: Repository: https://github.com/stripe/smokescreen
Blast Radius: 1.7

Affected Packages

go:github.com/stripe/smokescreen
Dependent packages: 1
Dependent repositories: 2
Downloads:
Affected Version Ranges: < 0.0.3
Fixed in: 0.0.3
All affected versions: 0.0.2
All unaffected versions: 0.0.3, 0.0.4