Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-39687
HistoryJul 05, 2024 - 5:39 p.m.

CVE-2024-39687 Fedify vulnerable to allowing access to internal network resources

2024-07-0517:39:34
CWE-918
GitHub_M
github.com
2
fedify
server side request forgery
vulnerability

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L

AI Score

7

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Fedify is a TypeScript library for building federated server apps powered by ActivityPub and other standards. At present, when Fedify needs to retrieve an object or activity from a remote activitypub server, it makes a HTTP request to the @id or other resources present within the activity it has received from the web. This activity could reference an @id that points to an internal IP address, allowing an attacker to send request to resources internal to the fedify server’s network. This applies to not just resolution of documents containing activities or objects, but also to media URLs as well. Specifically this is a Server Side Request Forgery attack. Users should upgrade to Fedify version 0.9.2, 0.10.1, or 0.11.1 to receive a patch for this issue.

CNA Affected

[
  {
    "vendor": "dahlia",
    "product": "fedify",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.9.2"
      },
      {
        "status": "affected",
        "version": "= 0.10.0"
      },
      {
        "status": "affected",
        "version": "= 0.11.0"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:dahlia:fedify:*:*:*:*:*:*:*:*"
    ],
    "vendor": "dahlia",
    "product": "fedify",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "0.11.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L

AI Score

7

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-39687