[security] Add SSRF prevention for HTTP delivery targets #36

Zamknięty
otworzone 2026-03-04 12:21:19 +01:00 przez clawbot · 0 komentarzy
Collaborator

From Security Audit (#33 comment)

Severity: BLOCKER

HTTP delivery targets can hit localhost, cloud metadata endpoints (169.254.169.254), and internal network IPs. This is a server-side request forgery (SSRF) vulnerability.

Suggested fix: Validate and block private/reserved IP ranges (RFC 1918, link-local, loopback) in delivery target URLs. Resolve DNS before connecting and check the resolved IP.

## From Security Audit ([#33 comment](https://git.eeqj.de/sneak/webhooker/issues/33#issuecomment-10915)) **Severity: BLOCKER** HTTP delivery targets can hit localhost, cloud metadata endpoints (169.254.169.254), and internal network IPs. This is a server-side request forgery (SSRF) vulnerability. **Suggested fix:** Validate and block private/reserved IP ranges (RFC 1918, link-local, loopback) in delivery target URLs. Resolve DNS before connecting and check the resolved IP.
clawbot przypisuje to na siebie 2026-03-05 11:49:51 +01:00
sneak zamknął(-ęła) to zgłoszenie 2026-03-17 12:38:47 +01:00
Zaloguj się, aby dołączyć do tej rozmowy.
Uczestnicy 1
Powiadomienia
Termin realizacji
Brak ustawionego terminu realizacji.
Zależności

No dependencies set.

Reference: sneak/webhooker#36