First published: Tue May 06 2025(Updated: )
### Summary Due to a validation error in `got.scpaping`, it is possible to use an HTTP redirect to avoid IP filtering. ### Details In `got.scpaping`, Summaly first makes a HTTP `HEAD` request to the page being summarized. It then preforms private IP address checks on the `HEAD` response, then makes an additional HTTP `GET` request to the page being summarized. Unfortunately, since private IP address checks aren't performed on the `GET` response, the `GET` response can issue a HTTP redirect to a private IP address, which will succeed, regardless of if private IP addresses are allowed by Summaly. ### PoC With a simple Caddy webserver, you can get Summaly to summarize a page hosted via a local IP address: ```caddy @summaly-bypass-head { method HEAD path /summaly-bypass } @summaly-bypass-get { method GET path /summaly-bypass } header @summaly-bypass-head Content-Type "text/html" respond @summaly-bypass-head 200 redir @summaly-bypass-get http://127.0.0.1:3080/ ``` ### Impact Using this bypass, an attacker can probe a victims internal network for HTTP services that aren't supposed to be exposed to the outside world. While they might only have read-only access through this, it may still be possible to extract sensitive information or be used to probe a network prior to attacking via other exploits without leaving a trace.
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@misskey-dev/summaly | >=5.1.0<5.2.1 | 5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
GHSA-jqx4-9gpq-rppm has a moderate severity due to its potential to bypass IP filtering.
To fix GHSA-jqx4-9gpq-rppm, upgrade to version 5.2.1 or later of the @misskey-dev/summaly package.
The vulnerability in GHSA-jqx4-9gpq-rppm arises from a validation error in the HTTP redirect handling of got.scpaping.
GHSA-jqx4-9gpq-rppm affects versions of @misskey-dev/summaly from 5.1.0 to 5.2.0.
At this time, there are no known public exploits specifically targeting GHSA-jqx4-9gpq-rppm.