GHSA-f2rj-m42r-6jm2

Suggest an improvement
Source
https://github.com/advisories/GHSA-f2rj-m42r-6jm2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-f2rj-m42r-6jm2/GHSA-f2rj-m42r-6jm2.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-f2rj-m42r-6jm2
Aliases
Published
2022-10-25T20:22:29Z
Modified
2023-11-01T04:59:43.489613Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Skipper vulnerable to SSRF via X-Skipper-Proxy
Details

Impact

Skipper prior to version v0.13.236 is vulnerable to server-side request forgery (SSRF). An attacker can exploit a vulnerable version of proxy to access the internal metadata server or other unauthenticated URLs by adding an specific header (X-Skipper-Proxy) to the http request.

Patches

The problem was patched in version https://github.com/zalando/skipper/releases/tag/v0.13.237. Users need to upgrade to skipper >=v0.13.237.

Workarounds

Use dropRequestHeader("X-Skipper-Proxy") filter

References

https://github.com/zalando/skipper/releases/tag/v0.13.237

For more information

If you have any questions or comments about this advisory:

  • Open an issue in https://github.com/zalando/skipper/issues/new/choose
  • Chat with us in slack: https://app.slack.com/client/T029RQSE6/C82Q5JNH5
Database specific
{
    "nvd_published_at": "2022-10-25T17:15:00Z",
    "cwe_ids": [
        "CWE-918"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2022-10-25T20:22:29Z"
}
References

Affected packages

Go / github.com/zalando/skipper

Package

Name
github.com/zalando/skipper
View open source insights on deps.dev
Purl
pkg:golang/github.com/zalando/skipper

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.13.237