Lucene search

K
githubGitHub Advisory DatabaseGHSA-67M4-QXP3-J6HH
HistoryJan 30, 2024 - 8:57 p.m.

TrueLayer.Client SSRF when fetching payment or payment provider

2024-01-3020:57:59
CWE-918
GitHub Advisory Database
github.com
13
truelayer.client
ssrf
vulnerability
payment process
information disclosure
httpclient
api classes
sdk
local networks
internet
egress rules
validation

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.2%

Impact

The vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure.

Patches

Versions of TrueLayer.Client v1.6.0 and later are not affected.

Workarounds

The issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the TrueLayer.Client library.

Affected configurations

Vulners
Node
github_advisory_databasetruelayer.clientRange<1.6.0
CPENameOperatorVersion
truelayer.clientlt1.6.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.2%

Related for GHSA-67M4-QXP3-J6HH