Lucene search

K
osvGoogleOSV:GHSA-67M4-QXP3-J6HH
HistoryJan 30, 2024 - 8:57 p.m.

TrueLayer.Client SSRF when fetching payment or payment provider

2024-01-3020:57:59
Google
osv.dev
5
ssrf
vulnerability
payment
payment provider
control over destination url
httpclient
api classes
information disclosure
truelayer.client
versions
egress rules
user input
library

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.2%

Impact

The vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure.

Patches

Versions of TrueLayer.Client v1.6.0 and later are not affected.

Workarounds

The issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the TrueLayer.Client library.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.2%

Related for OSV:GHSA-67M4-QXP3-J6HH