<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Deepseek-Tui (&lt; 0.8.22) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/deepseek-tui--0.8.22/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 20:36:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/deepseek-tui--0.8.22/feed.xml" rel="self" type="application/rss+xml"/><item><title>DeepSeek TUI SSRF Vulnerability via HTTP Redirect Bypass (CVE-2026-45310)</title><link>https://feed.craftedsignal.io/briefs/2026-05-deepseek-tui-ssrf/</link><pubDate>Thu, 14 May 2026 20:36:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-deepseek-tui-ssrf/</guid><description>DeepSeek TUI is vulnerable to a Server-Side Request Forgery (SSRF) attack (CVE-2026-45310) because the `fetch_url` tool validates the initial URL against a restricted-IP blocklist but fails to re-validate redirect targets, allowing attackers to exfiltrate sensitive information from cloud-hosted instances by using a redirect to a restricted IP address.</description><content:encoded><![CDATA[<p>DeepSeek TUI is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-45310) in versions prior to 0.8.22. The vulnerability exists in the <code>fetch_url</code> tool, which is intended to prevent SSRF attacks by validating the initial URL&rsquo;s resolved IP address against a restricted-IP blocklist. However, the HTTP client (<code>reqwest</code>) is configured to automatically follow up to 5 redirects without re-validating the redirect target against the same SSRF protections. This allows an attacker to bypass the SSRF protection by using a redirect to a restricted IP address. The attack is triggered via prompt injection, where malicious instructions embedded in files or web content cause the model to call <code>fetch_url</code> with an attacker-controlled URL. This allows an attacker to exfiltrate sensitive information from cloud-hosted instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a DeepSeek TUI instance running a vulnerable version (&lt; 0.8.22).</li>
<li>The attacker crafts a prompt containing a malicious URL that exploits the <code>fetch_url</code> tool. This prompt could be injected via a file or web content processed by the model.</li>
<li>The malicious URL points to a publicly accessible server (e.g., httpbin.org) configured to redirect the request.</li>
<li>The redirect target is a restricted IP address, such as a cloud metadata endpoint (e.g., <code>http://169.254.169.254/latest/meta-data/</code>).</li>
<li>DeepSeek TUI&rsquo;s <code>fetch_url</code> tool validates the initial URL, which passes the SSRF filter because it points to a public domain.</li>
<li>The <code>reqwest</code> HTTP client automatically follows the redirect to the restricted IP address <em>without</em> re-validating against the SSRF filter.</li>
<li>The <code>fetch_url</code> tool connects to the restricted IP address and retrieves sensitive data, such as cloud IAM credentials or instance metadata.</li>
<li>The attacker exfiltrates the retrieved data, potentially gaining unauthorized access to cloud resources or sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-45310) allows an attacker to bypass intended security controls and access internal services. On cloud-hosted instances (AWS, GCP, Azure), an attacker can exfiltrate cloud IAM credentials, instance metadata, and other sensitive internal service data by redirecting <code>fetch_url</code> to <code>http://169.254.169.254/latest/meta-data/</code>. This can lead to privilege escalation, data breaches, and unauthorized access to sensitive resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to DeepSeek TUI version 0.8.22 or later to patch the SSRF vulnerability (CVE-2026-45310).</li>
<li>Implement input validation and sanitization to prevent prompt injection attacks that could trigger the <code>fetch_url</code> tool with malicious URLs.</li>
<li>Monitor network connections originating from DeepSeek TUI instances for connections to internal IP addresses, as indicated in the IOCs.</li>
<li>Deploy the Sigma rule to detect attempts to bypass the SSRF filter by redirecting to restricted IP addresses.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>prompt-injection</category><category>cloud-metadata</category></item></channel></rss>