Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
requests-hardened: Server-Side Request Forgery (SSRF) in requests-hardened RFC 6598
Vulnerability Description
requests-hardened is a library that overrides the default behaviors of the requests library, and adds new security features. Prior to , the SSRF protection in requests-hardened fails to block IP addresses within the RFC 6598 Shared Address Space (100.64.0.0/10). An attacker who can supply arbitrary URLs to requests-hardened could exploit this gap to access internal services hosted within 100.64.0.0/10. This is for example relevant in environments such as AWS EKS where 100.64.0.0/10 is commonly used as the default pod CIDR. The impact is environment-dependent, deployments that utilize the affected CIDR range for internal networking are exposed to SSRF bypass, while others may not be affected. This vulnerability is fixed in .
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
requests-hardened 代码问题漏洞
Vulnerability Description
requests-hardened是Saleor Commerce开源的一个增强HTTP请求安全性的Python库。 requests-hardened存在代码问题漏洞,该漏洞源于SSRF保护未能阻止RFC 6598共享地址空间,可能导致攻击者访问内部服务。
CVSS Information
N/A
Vulnerability Type
N/A