Skipper prior to version v0.13.236 is vulnerable to server-side request forgery (SSRF). An attacker can exploit a vulnerable version of proxy to access the internal metadata server or other unauthenticated URLs by adding an specific header (X-Skipper-Proxy) to the http request.
The problem was patched in version https://github.com/zalando/skipper/releases/tag/v0.13.237.
Users need to upgrade to skipper >=v0.13.237.
Use dropRequestHeader("X-Skipper-Proxy") filter
https://github.com/zalando/skipper/releases/tag/v0.13.237
If you have any questions or comments about this advisory:
{
"cwe_ids": [
"CWE-918"
],
"severity": "CRITICAL",
"github_reviewed_at": "2022-10-25T20:22:29Z",
"nvd_published_at": "2022-10-25T17:15:00Z",
"github_reviewed": true
}