Skip to content

SSRF protection bypass possible with IPv4-mapped IPv6 addresses

Moderate
jomaxro published GHSA-26h3-8ww8-v5fc Mar 17, 2023

Package

Discourse (Discourse)

Affected versions

beta <= 3.1.0.beta2; tests-passed <= 3.1.0.beta2

Patched versions

beta >= 3.1.0.beta3; tests-passed >= 3.1.0.beta3

Description

Impact

Attackers will be able to bypass our SSRF protection for private IPv4 addresses by using a IPv4-mapped IPv6 address.

Patches

The issue is patched in the latest beta and tests-passed version of Discourse.

Workarounds

None.

Severity

Moderate
5.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

CVE ID

CVE-2023-28111

Weaknesses

No CWEs