Skipper prior to version v0.13.236 is vulnerable to server-side request forgery (SSRF). An attacker can exploit a vulnerable version of proxy to access the internal metadata server or other unauthenticated URLs by adding an specific header (X-Skipper-Proxy) to the http request.
The problem was patched in version https://github.com/zalando/skipper/releases/tag/v0.13.237.
Users need to upgrade to skipper >=v0.13.237
.
Use dropRequestHeader("X-Skipper-Proxy")
filter
https://github.com/zalando/skipper/releases/tag/v0.13.237
If you have any questions or comments about this advisory:
{ "nvd_published_at": "2022-10-25T17:15:00Z", "cwe_ids": [ "CWE-918" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2022-10-25T20:22:29Z" }