Microcks SSRF Vulnerability #892
b33t1e
started this conversation in
Show and tell
Replies: 1 comment 1 reply
-
Hello, Thanks for raising this discussion. I have to admit I'm lacking a bit of context on this topic as I don't know how to evaluate the risks and the impact of such a vulnerability. What can typically do an attacker that would exploit it? I mean I have basic knowledge of SSRF but in this particular use case how could we avoid connecting to an external URL? And is there some risk as we're expecting a well-formed artifact and not running arbitrary code that may be provided by this external URL? Thanks for your explanation. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Microcks up to 1.17.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /jobs and /artifact/download. This vulnerability allows attackers to access network resources and sensitive information via a crafted GET request.
Beta Was this translation helpful? Give feedback.
All reactions