[security] Add SSRF prevention for HTTP delivery targets #36
Labels
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: sneak/webhooker#36
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
From Security Audit (#33 comment)
Severity: BLOCKER
HTTP delivery targets can hit localhost, cloud metadata endpoints (169.254.169.254), and internal network IPs. This is a server-side request forgery (SSRF) vulnerability.
Suggested fix: Validate and block private/reserved IP ranges (RFC 1918, link-local, loopback) in delivery target URLs. Resolve DNS before connecting and check the resolved IP.