Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9jhm-8m8c-c3f4

Опубликовано: 19 апр. 2021
Источник: github
Github: Прошло ревью
CVSS4: 6.3
CVSS3: 7.7

Описание

SSRF in Sydent due to missing validation of hostnames

Impact

Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting.

It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration.

Patches

Fixed in 9e57334, 8936925, 3d531ed, 0f00412

Workarounds

A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.

For more information

If you have any questions or comments about this advisory, email us at security@matrix.org.

Пакеты

Наименование

matrix-sydent

pip
Затронутые версииВерсия исправления

< 2.3.0

2.3.0

EPSS

Процентиль: 53%
0.00303
Низкий

6.3 Medium

CVSS4

7.7 High

CVSS3

Дефекты

CWE-20
CWE-918

Связанные уязвимости

CVSS3: 7.7
nvd
почти 5 лет назад

Sydent is a reference Matrix identity server. Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting. It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration. This issue has been addressed in in 9e57334, 8936925, 3d531ed, 0f00412. A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.

CVSS3: 7.7
debian
почти 5 лет назад

Sydent is a reference Matrix identity server. Sydent can be induced to ...

EPSS

Процентиль: 53%
0.00303
Низкий

6.3 Medium

CVSS4

7.7 High

CVSS3

Дефекты

CWE-20
CWE-918