Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-373w-rj84-pv6x: SafeURL-Python's hostname blocklist does not block FQDNs

Description

If a hostname was blacklisted, it was possible to bypass the blacklist by requesting the FQDN of the host (e.g. adding . to the end).

Impact

The main purpose of this library is to block requests to internal/private IPs and these cannot be bypassed using this finding. But if a library user had specifically set certain hostnames as blocked, then an attacker would be able to circumvent that block to cause SSRFs to request those hostnames.

Patches

Fixed by https://github.com/IncludeSecurity/safeurl-python/pull/6

Credit

https://github.com/Sim4n6

ghsa
#git#ssrf

Package

pip SafeURL-Python (pip)

Affected versions

< 1.3

Patched versions

1.3

Description

Description

If a hostname was blacklisted, it was possible to bypass the blacklist by requesting the FQDN of the host (e.g. adding . to the end).

Impact

The main purpose of this library is to block requests to internal/private IPs and these cannot be bypassed using this finding. But if a library user had specifically set certain hostnames as blocked, then an attacker would be able to circumvent that block to cause SSRFs to request those hostnames.

Patches

Fixed by IncludeSecurity/safeurl-python#6

Credit

https://github.com/Sim4n6

References

  • GHSA-373w-rj84-pv6x
  • IncludeSecurity/safeurl-python#6
  • IncludeSecurity/safeurl-python@c4f9677

includesec-ltennant published to IncludeSecurity/safeurl-python

Jun 23, 2023

Published to the GitHub Advisory Database

Jun 29, 2023

Reviewed

Jun 29, 2023

Last updated

Jun 29, 2023

ghsa: Latest News

GHSA-pxg6-pf52-xh8x: cookie accepts cookie name, path, and domain with out of bounds characters