Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-39687
HistoryJul 05, 2024 - 5:39 p.m.

CVE-2024-39687 Fedify vulnerable to allowing access to internal network resources

2024-07-0517:39:34
CWE-918
GitHub_M
www.cve.org
5
fedify
ssrf
vulnerability
patch
upgrade
cve-2024-39687
internal network access

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L

EPSS

0.001

Percentile

26.6%

Fedify is a TypeScript library for building federated server apps powered by ActivityPub and other standards. At present, when Fedify needs to retrieve an object or activity from a remote activitypub server, it makes a HTTP request to the @id or other resources present within the activity it has received from the web. This activity could reference an @id that points to an internal IP address, allowing an attacker to send request to resources internal to the fedify server’s network. This applies to not just resolution of documents containing activities or objects, but also to media URLs as well. Specifically this is a Server Side Request Forgery attack. Users should upgrade to Fedify version 0.9.2, 0.10.1, or 0.11.1 to receive a patch for this issue.

CNA Affected

[
  {
    "vendor": "dahlia",
    "product": "fedify",
    "versions": [
      {
        "version": "< 0.9.2",
        "status": "affected"
      },
      {
        "version": "= 0.10.0",
        "status": "affected"
      },
      {
        "version": "= 0.11.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L

EPSS

0.001

Percentile

26.6%

Related for CVELIST:CVE-2024-39687