If a hostname was blacklisted, it was possible to bypass the blacklist by requesting the FQDN of the host (e.g. adding . to the end).
The main purpose of this library is to block requests to internal/private IPs and these cannot be bypassed using this finding. But if a library user had specifically set certain hostnames as blocked, then an attacker would be able to circumvent that block to cause SSRFs to request those hostnames.
Fixed by https://github.com/IncludeSecurity/safeurl-python/pull/6
https://github.com/Sim4n6
{
"github_reviewed_at": "2023-06-29T15:02:16Z",
"github_reviewed": true,
"cwe_ids": [],
"severity": "LOW",
"nvd_published_at": null
}