[security] Add SSRF prevention for HTTP delivery targets #36

Closed
opened 2026-03-04 12:21:19 +01:00 by clawbot · 0 comments
Collaborator

From Security Audit (#33 comment)

Severity: BLOCKER

HTTP delivery targets can hit localhost, cloud metadata endpoints (169.254.169.254), and internal network IPs. This is a server-side request forgery (SSRF) vulnerability.

Suggested fix: Validate and block private/reserved IP ranges (RFC 1918, link-local, loopback) in delivery target URLs. Resolve DNS before connecting and check the resolved IP.

## From Security Audit ([#33 comment](https://git.eeqj.de/sneak/webhooker/issues/33#issuecomment-10915)) **Severity: BLOCKER** HTTP delivery targets can hit localhost, cloud metadata endpoints (169.254.169.254), and internal network IPs. This is a server-side request forgery (SSRF) vulnerability. **Suggested fix:** Validate and block private/reserved IP ranges (RFC 1918, link-local, loopback) in delivery target URLs. Resolve DNS before connecting and check the resolved IP.
clawbot self-assigned this 2026-03-05 11:49:51 +01:00
sneak closed this issue 2026-03-17 12:38:47 +01:00
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: sneak/webhooker#36