漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
Terrascan v1.18.3 and prior are vulnerable to Server-Side Request Forgery (SSRF) via the webhook_url parameter in the file scan endpoint (POST /v1/{iac}/{iacVersion}/{cloud}/local/file/scan) when running in server mode. An unauthenticated remote attacker can supply an arbitrary URL as the webhook_url multipart form parameter. After scanning the uploaded file, Terrascan sends an HTTP POST request to the attacker-controlled URL containing the full scan results as a JSON body, with the attacker-supplied webhook_token forwarded as a Bearer token in the Authorization header. The retryable HTTP client retries up to 10 times on failure. This affects deployments running terrascan in server mode (terrascan server), which binds to 0.0.0.0 with no authentication. Note: Terrascan was archived in August 2023 and no patch will be released.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
terrascan 代码问题漏洞
Vulnerability Description
terrascan是Tenable开源的一个基础设施代码静态安全分析工具。 terrascan 1.18.3及之前版本存在代码问题漏洞,该漏洞源于文件扫描端点中的webhook_url参数存在服务端请求伪造漏洞,当在服务器模式下运行时,未经身份验证的远程攻击者可提供任意URL作为webhook_url参数,Terrascan在扫描上传文件后会向攻击者控制的URL发送包含完整扫描结果的HTTP POST请求,可能导致信息泄露。
CVSS Information
N/A
Vulnerability Type
N/A