GHSA-9jhm-8m8c-c3f4

Suggest an improvement
Source
https://github.com/advisories/GHSA-9jhm-8m8c-c3f4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-9jhm-8m8c-c3f4/GHSA-9jhm-8m8c-c3f4.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-9jhm-8m8c-c3f4
Aliases
Published
2021-04-19T14:54:15Z
Modified
2024-09-30T21:34:36.453628Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N CVSS Calculator
Summary
SSRF in Sydent due to missing validation of hostnames
Details

Impact

Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting.

It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration.

Patches

Fixed in 9e57334, 8936925, 3d531ed, 0f00412

Workarounds

A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.

For more information

If you have any questions or comments about this advisory, email us at security@matrix.org.

Database specific
{
    "nvd_published_at": "2021-04-15T21:15:00Z",
    "cwe_ids": [
        "CWE-20",
        "CWE-918"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2021-04-15T21:00:29Z"
}
References

Affected packages

PyPI / matrix-sydent

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.0

Affected versions

2.*

2.0.0
2.0.1
2.1.0
2.2.0