<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dssrf (&lt; 1.3.0) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/dssrf--1.3.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 18:13:32 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/dssrf--1.3.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>dssrf SSRF Protection Bypass via IPv6 Addresses</title><link>https://feed.craftedsignal.io/briefs/2024-01-dssrf-ipv6-bypass/</link><pubDate>Wed, 06 May 2026 18:13:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dssrf-ipv6-bypass/</guid><description>A vulnerability in the dssrf npm package allows attackers to bypass SSRF protections by using specially crafted IPv6 addresses, despite documentation claiming IPv6 is disabled, which can lead to internal resource access or other malicious activities.</description><content:encoded><![CDATA[<p>The dssrf npm package, designed to prevent Server-Side Request Forgery (SSRF) attacks, contains a flaw that permits attackers to bypass its protections. This bypass is achieved by supplying specific IPv6 addresses that the <code>is_url_safe</code> function fails to properly validate. The dssrf documentation incorrectly states that IPv6 is disabled entirely, leading to a false sense of security.  The vulnerability affects versions prior to 1.3.0. This allows attackers to potentially access internal network resources or conduct other malicious activities by crafting requests that appear safe but are ultimately routed to unintended destinations. This issue was reported responsibly, and users are urged to update to version 1.3.0 immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a web application utilizing a vulnerable version of the <code>dssrf</code> npm package for URL safety checks.</li>
<li>The attacker crafts a malicious URL containing an IPv6 address designed to bypass the <code>is_url_safe</code> function, such as <code>http://[::1]/</code> (IPv6 loopback) or <code>http://[::ffff:169.254.169.254]/</code> (IPv4-mapped IMDS).</li>
<li>The web application, relying on the flawed <code>dssrf.is_url_safe</code> function, incorrectly identifies the malicious URL as safe.</li>
<li>The web application then uses the &ldquo;safe&rdquo; URL to make an HTTP request using standard libraries like <code>node-fetch</code>.</li>
<li>Due to the bypassed SSRF protection, the request is sent to the attacker-specified IPv6 address, potentially targeting internal resources or services.</li>
<li>The internal service processes the attacker&rsquo;s request, potentially exposing sensitive data or allowing unauthorized actions.</li>
<li>The attacker receives the response from the internal service, successfully exfiltrating data or manipulating internal systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass SSRF protections, potentially granting access to internal network resources, sensitive data, or unintended services.  The number of affected applications is currently unknown, but any application using a vulnerable version of <code>dssrf</code> (&lt; 1.3.0) is susceptible.  This could lead to data breaches, unauthorized access to cloud metadata services, or other internal service exploitation.  The vulnerable package has had over 10,000 weekly downloads, demonstrating widespread use and potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>dssrf</code> npm package to version 1.3.0 or later to remediate the vulnerability as advised in the advisory (<a href="https://github.com/advisories/GHSA-8p33-q827-ghj5)">https://github.com/advisories/GHSA-8p33-q827-ghj5)</a>.</li>
<li>Implement additional server-side input validation to filter URLs containing potentially malicious IPv6 addresses, complementing the <code>dssrf</code> package.</li>
<li>Deploy the Sigma rule provided below to identify attempts to bypass SSRF protections by using IPv6 addresses in URLs (see Sigma rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>vulnerability</category><category>ipv6</category><category>defense-evasion</category></item></channel></rss>