Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vq52-99r9-h5pw

Опубликовано: 11 фев. 2025
Источник: github
Github: Прошло ревью
CVSS4: 2.9
CVSS3: 6.5

Описание

Server-side Request Forgery (SSRF) in hackney

Versions of the package hackney from 0.0.0 are vulnerable to Server-side Request Forgery (SSRF) due to improper parsing of URLs by URI built-in module and hackey. Given the URL http://127.0.0.1?@127.2.2.2/, the URI function will parse and see the host as 127.0.0.1 (which is correct), and hackney will refer the host as 127.2.2.2/. This vulnerability can be exploited when users rely on the URL function for host checking.

Пакеты

Наименование

hackney

Затронутые версииВерсия исправления

< 1.21.0

1.21.0

EPSS

Процентиль: 17%
0.00053
Низкий

2.9 Low

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 6.5
nvd
12 месяцев назад

Versions of the package hackney before 1.21.0 are vulnerable to Server-side Request Forgery (SSRF) due to improper parsing of URLs by URI built-in module and hackey. Given the URL http://127.0.0.1?@127.2.2.2/, the URI function will parse and see the host as 127.0.0.1 (which is correct), and hackney will refer the host as 127.2.2.2/. This vulnerability can be exploited when users rely on the URL function for host checking.

EPSS

Процентиль: 17%
0.00053
Низкий

2.9 Low

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-918