If a hostname was blacklisted, it was possible to bypass the blacklist by requesting the FQDN of the host (e.g. adding .
to the end).
The main purpose of this library is to block requests to internal/private IPs and these cannot be bypassed using this finding. But if a library user had specifically set certain hostnames as blocked, then an attacker would be able to circumvent that block to cause SSRFs to request those hostnames.
Fixed by https://github.com/IncludeSecurity/safeurl-python/pull/6
https://github.com/Sim4n6
{ "nvd_published_at": null, "cwe_ids": [], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2023-06-29T15:02:16Z" }