Kaspersky has fixed the following security problem in the TinyCheck open source tool. The tool was vulnerable to a Server-Side Request Forgery (SSRF) attack, allowing an authenticated attacker to force the "watcher" service component of the tool to send an HTTP GET request to the crafted URLs. Issue type: SSRF.
List of affected products
TinyCheck without commits 9fd360d and ea53de8 from December 18th
Fixed versions
TinyCheck with commits 9fd360d and ea53de8 from December 18th
To update the tool to the latest commit/version, use the following commands: #cd /usr/share/tinycheck/ && bash update.sh.
Acknowledgements
We would like to thank the security researchers from Sayfer who discovered this issue and responsibly reported it.
Kaspersky has fixed the following security problem in the TinyCheck open source tool. The tool was vulnerable to a Server-Side Request Forgery (SSRF) attack, allowing an authenticated attacker to force the "watcher" service component of the tool to send an HTTP GET request to the crafted URLs. Issue type: SSRF.
List of affected products
TinyCheck without commits 9fd360d and ea53de8 from December 18th
Fixed versions
TinyCheck with commits 9fd360d and ea53de8 from December 18th
To update the tool to the latest commit/version, use the following commands: #cd /usr/share/tinycheck/ && bash update.sh.
Acknowledgements
We would like to thank the security researchers from Sayfer who discovered this issue and responsibly reported it.