<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>@Angular/Platform-Server (&gt;= 22.0.0-Next.0, &lt; 22.0.0-Next.12) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/@angular/platform-server--22.0.0-next.0--22.0.0-next.12/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 20:31:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/@angular/platform-server--22.0.0-next.0--22.0.0-next.12/feed.xml" rel="self" type="application/rss+xml"/><item><title>Angular platform-server SSRF via Hostname Hijacking (CVE-2026-46417)</title><link>https://feed.craftedsignal.io/briefs/2026-05-angular-ssrf/</link><pubDate>Tue, 19 May 2026 20:31:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-angular-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in `@angular/platform-server` due to improper processing of the request URL by the server-side rendering engine, allowing attackers to redirect relative HTTP requests to attacker-controlled servers, potentially exposing internal APIs or metadata services; patch CVE-2026-46417 immediately.</description><content:encoded><![CDATA[<p>A Server-Side Request Forgery (SSRF) vulnerability has been identified in <code>@angular/platform-server</code>. This vulnerability arises from the server-side rendering (SSR) engine&rsquo;s handling of request URLs. When an absolute-form URL (e.g., <code>http://evil.com</code>) is provided to the rendering engine, the internal <code>ServerPlatformLocation</code> can be manipulated. This manipulation allows an attacker to set the hostname to an attacker-controlled domain. This issue impacts versions of <code>@angular/platform-server</code> prior to the patched versions: 22.0.0-next.12, 21.2.13, 20.3.21, and 19.2.22 and also impacts versions <code>&lt;= 18.2.14</code>. This vulnerability enables the redirection of relative <code>HttpClient</code> requests and <code>PlatformLocation.hostname</code> references to the attacker&rsquo;s server, potentially exposing internal APIs or metadata services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious URL with an absolute form (e.g., <code>http://evil.com</code>).</li>
<li>This malicious URL is passed to the <code>@angular/platform-server</code> rendering engine&rsquo;s entry points (<code>renderModule</code> or <code>renderApplication</code>).</li>
<li>The <code>ServerPlatformLocation</code> internal component processes the URL.</li>
<li>Due to the vulnerability, <code>ServerPlatformLocation</code> is manipulated to adopt the attacker-controlled domain (<code>evil.com</code>) as the &ldquo;current&rdquo; hostname.</li>
<li>The Angular application, during server-side rendering, makes a relative <code>HttpClient</code> request (e.g., <code>/api/internal</code>).</li>
<li>This relative request, intended for the legitimate server, is now redirected to <code>http://evil.com/api/internal</code>.</li>
<li>The attacker&rsquo;s server receives the redirected request, potentially containing sensitive information.</li>
<li>The attacker gains unauthorized access to internal APIs or metadata services through the redirected request.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-46417) can lead to the exposure of sensitive internal APIs and metadata services. An attacker could potentially gain access to confidential data, modify application settings, or perform unauthorized actions on behalf of the server. This can lead to data breaches, system compromise, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to the patched versions of <code>@angular/platform-server</code>: 22.0.0-next.12, 21.2.13, 20.3.21, or 19.2.22 to mitigate the vulnerability as noted in the advisory.</li>
<li>For developers unable to update immediately, implement strict URL validation in their server entry point (e.g., <code>server.ts</code>) as suggested in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Angular platform-server SSRF via Hostname Hijacking (CVE-2026-46417)&rdquo; to detect potential exploitation attempts by monitoring server logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>angular</category><category>vulnerability</category></item></channel></rss>