Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-23838
HistoryJan 30, 2024 - 4:26 p.m.

CVE-2024-23838 TrueLayer.Client SSRF when fetching payment or payment provider

2024-01-3016:26:00
CWE-918
GitHub_M
www.cve.org
vulnerability
truelayer.net
ssrf
payment provider
information disclosure
egress rules
validation
truelayer.client
v1.6.0

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

37.2%

TrueLayer.NET is the .Net client for TrueLayer. The vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure. The issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the truelayer-dotnet library. Versions of TrueLayer.Client v1.6.0 and later are not affected.

CNA Affected

[
  {
    "vendor": "TrueLayer",
    "product": "truelayer-dotnet",
    "versions": [
      {
        "version": "< 1.6.0",
        "status": "affected"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

37.2%

Related for CVELIST:CVE-2024-23838