Lucene search

K
cveGitHub_MCVE-2024-39687
HistoryJul 05, 2024 - 6:15 p.m.

CVE-2024-39687

2024-07-0518:15:32
CWE-918
GitHub_M
web.nvd.nist.gov
26
fedify
ssrf
http request

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L

EPSS

0.001

Percentile

26.6%

Fedify is a TypeScript library for building federated server apps powered by ActivityPub and other standards. At present, when Fedify needs to retrieve an object or activity from a remote activitypub server, it makes a HTTP request to the @id or other resources present within the activity it has received from the web. This activity could reference an @id that points to an internal IP address, allowing an attacker to send request to resources internal to the fedify server’s network. This applies to not just resolution of documents containing activities or objects, but also to media URLs as well. Specifically this is a Server Side Request Forgery attack. Users should upgrade to Fedify version 0.9.2, 0.10.1, or 0.11.1 to receive a patch for this issue.

Affected configurations

Vulners
Vulnrichment
Node
dahliafedifyRange<0.9.2
OR
dahliafedify
OR
dahliafedify
VendorProductVersionCPE
dahliafedify*cpe:2.3:a:dahlia:fedify:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "dahlia",
    "product": "fedify",
    "versions": [
      {
        "version": "< 0.9.2",
        "status": "affected"
      },
      {
        "version": "= 0.10.0",
        "status": "affected"
      },
      {
        "version": "= 0.11.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L

EPSS

0.001

Percentile

26.6%