[security] Add SSRF prevention for HTTP delivery targets #36

Open
opened 2026-03-04 12:21:19 +01:00 by clawbot · 0 comments
Collaborator

From Security Audit (#33 comment)

Severity: BLOCKER

HTTP delivery targets can hit localhost, cloud metadata endpoints (169.254.169.254), and internal network IPs. This is a server-side request forgery (SSRF) vulnerability.

Suggested fix: Validate and block private/reserved IP ranges (RFC 1918, link-local, loopback) in delivery target URLs. Resolve DNS before connecting and check the resolved IP.

## From Security Audit ([#33 comment](https://git.eeqj.de/sneak/webhooker/issues/33#issuecomment-10915)) **Severity: BLOCKER** HTTP delivery targets can hit localhost, cloud metadata endpoints (169.254.169.254), and internal network IPs. This is a server-side request forgery (SSRF) vulnerability. **Suggested fix:** Validate and block private/reserved IP ranges (RFC 1918, link-local, loopback) in delivery target URLs. Resolve DNS before connecting and check the resolved IP.
Sign in to join this conversation.
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: sneak/webhooker#36
No description provided.