Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
twenty-server SSRF protection bypass via IPv4-mapped IPv6 address normalization
Vulnerability Description
Twenty is an open source CRM built with NestJS (Node.js). In versions 1.18.0 and earlier, the SSRF protection in twenty-server's SecureHttpClientService can be bypassed using IPv4-mapped IPv6 addresses in URL IP literals. Node.js's URL parser normalizes IPv4-mapped IPv6 addresses to compressed hex form (e.g., ::ffff:169.254.169.254 becomes ::ffff:a9fe:a9fe), but the isPrivateIp utility only recognizes the dotted-decimal notation. As a result, the hex form passes the SSRF check unchecked. Additionally, the socket lookup validation event does not fire for IP literal addresses, bypassing the second validation layer. An authenticated user can reach any internal IP, including cloud metadata endpoints, to exfiltrate credentials such as IAM keys.
CVSS Information
N/A
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
Twenty 代码问题漏洞
Vulnerability Description
Twenty是Twenty开源的一个 CRM 平台。 Twenty 1.18.0及之前版本存在代码问题漏洞,该漏洞源于SSRF保护可被IPv4映射的IPv6地址绕过,Node.js URL解析器将IPv4映射的IPv6地址标准化为压缩十六进制形式,但isPrivateIp工具仅识别点分十进制表示法,导致十六进制形式绕过SSRF检查,可能导致认证用户访问内部IP并窃取IAM密钥等凭据。
CVSS Information
N/A
Vulnerability Type
N/A