First published: Tue Apr 19 2022(Updated: )
Smokescreen is a simple HTTP proxy that fogs over naughty URLs. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by appending a dot to the end of user-supplied URLs, or by providing input in a different letter case. Recommended to upgrade Smokescreen to version 0.0.3 or later.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Stripe | <0.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24825 has been classified as a medium severity vulnerability.
CVE-2022-24825 allows for potential server-side request forgery (SSRF) attacks due to improper validation of URLs.
To mitigate CVE-2022-24825, upgrade Smokescreen to version 0.0.4 or higher.
CVE-2022-24825 could enable attackers to exploit Smokescreen to access internal services that are not intended to be publicly accessible.
CVE-2022-24825 affects Smokescreen versions up to and including 0.0.3.