First published: Fri May 20 2022(Updated: )
Smokescreen is an HTTP proxy. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by surrounding the hostname with square brackets (e.g. `[example.com]`). This only impacted the HTTP proxy functionality of Smokescreen. HTTPS requests were not impacted. Smokescreen version 0.0.4 contains a patch for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Stripe | <0.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29188 has been rated with moderate severity due to its potential for SSRF exploitation.
To fix CVE-2022-29188, upgrade to Smokescreen version 0.0.4 or later.
CVE-2022-29188 is designed to prevent server-side request forgery (SSRF) attacks.
CVE-2022-29188 affects versions of Stripe's Smokescreen prior to 0.0.4.
Smokescreen is an HTTP proxy specifically aimed at mitigating SSRF vulnerabilities in applications.