-
-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] SSRF protection bypass #2
Comments
Hi @azu :). Thank you, |
@Mik317 Thanks for report! Probably, aneone use this module yet. If you want to do privately, please follows this docs https://github.com/azu/request-filtering-agent/blob/master/SECURITY.md I created this document, now :) |
Regarding the pull request, I'm not a good Regarding my second question: would you consider this an issue or a missed functionality? Best, Mik |
OK, I gave a look to your code, and seems you enable filters against IPv6 urls, like Also, the check done for IPv6 is limited only to this: https://github.com/azu/request-filtering-agent/blob/master/src/request-filtering-agent.ts#L48 Regarding the fix, I'm working on something similar more a blacklist than a real and well implemented solution (mainly because I don't have much time to do things correctly ...). So, I suggest to add to the
I'll let you know if there are other possible bypasses as well :) Best, Mik |
Mh, should I report the issue in mapping them also in their repository? Best, Mik |
I found similar issue.
what does it mean? |
I've tried to fix in #3 and publish https://github.com/azu/request-filtering-agent/releases/tag/1.0.4 I'll investigate IPv6 address testing #4 Thanks again @Mik317 |
Sorry. I overeloooked your question. #2 (comment)
It is difficult question. |
Hi Team :),
I'm a sec-researcher from HackerOne and I've discovered a good way to bypass the
SSRF protection
usingIPv6
formatted URLs ... that aren't correctly checked, allowing me to bypass the protection provided by the module and at the same time, access to the content of private and local resources ;)I've already reported the issue on the official NPM https://hackerone.com/nodejs-ecosystem program, but the team said it's a "missed functionality and not a bug" ... so I'd like to know how can I report the issue (I add directly the report here?), and if you're ok to consider this a valid issue in order to let me know earn reputation/be awared (probably) with a CVE :).
Best, Mik
The text was updated successfully, but these errors were encountered: