<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ech0 (&lt; 1.4.8-0.20260503040602-091d26d2d942) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/ech0--1.4.8-0.20260503040602-091d26d2d942/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/ech0--1.4.8-0.20260503040602-091d26d2d942/feed.xml" rel="self" type="application/rss+xml"/><item><title>Ech0 Server-Side Request Forgery (SSRF) Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-ech0-ssrf/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ech0-ssrf/</guid><description>Ech0 is vulnerable to Server-Side Request Forgery (SSRF) via the `fetchPeerConnectInfo` function, which uses `httpUtil.SendRequest` without SSRF protection, allowing authenticated users to make the server request arbitrary URLs, including internal/cloud metadata endpoints.</description><content:encoded><![CDATA[<p>Ech0, a service developed by lin-snow, is susceptible to a Server-Side Request Forgery (SSRF) vulnerability. The vulnerability lies in the <code>fetchPeerConnectInfo</code> function (<code>internal/service/connect/connect.go</code>) where <code>httpUtil.SendRequest</code> is used instead of <code>SendSafeRequest</code>. This oversight allows authenticated users to craft connections to internal or external services, leading to unauthorized information disclosure. Specifically, attackers can target internal services, cloud metadata endpoints like AWS IMDSv1 (169.254.169.254), GCE metadata, and the Kubernetes API (kubernetes.default.svc.cluster.local). The affected version is any version of ech0 prior to commit <code>1.4.8-0.20260503040602-091d26d2d942</code>. This vulnerability was reported on May 7, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the Ech0 service.</li>
<li>The attacker crafts a malicious POST request to <code>/api/connects</code> to add a new connection.</li>
<li>In the POST request, the <code>connect_url</code> field is set to a URL pointing to an internal resource, such as <code>http://169.254.169.254/latest/meta-data/instance-id</code> (AWS metadata service) or <code>http://kubernetes.default.svc.cluster.local:443/api</code> (Kubernetes API).</li>
<li>The Ech0 server receives the POST request and stores the malicious <code>connect_url</code>.</li>
<li>The attacker triggers a health check on the newly created connection via a request to <code>/api/connects/health</code>.</li>
<li>The <code>fetchPeerConnectInfo</code> function is called with the attacker-controlled URL.</li>
<li><code>httpUtil.SendRequest</code> makes an HTTP request to the specified internal resource without proper validation.</li>
<li>The response from the internal resource is returned to the attacker, potentially revealing sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an attacker to access sensitive internal resources that are normally protected. This includes cloud metadata, such as AWS EC2 instance IDs, IAM roles, and other configuration details. Access to the Kubernetes API could allow for further lateral movement and privilege escalation within the Kubernetes cluster. The number of potential victims is dependent on the deployment scale and network architecture of Ech0 instances, but all authenticated users could potentially trigger the vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of Ech0 that includes the fix for this vulnerability (<code>&gt;= 1.4.8-0.20260503040602-091d26d2d942</code>).</li>
<li>Deploy the Sigma rule <code>Detect Ech0 SSRF via Connection to Metadata Endpoint</code> to identify attempts to exploit this vulnerability by detecting connections to common cloud metadata endpoints.</li>
<li>Monitor network connections for outbound traffic originating from the Ech0 server to internal IP addresses or domains, specifically <code>169.254.169.254</code> and <code>kubernetes.default.svc.cluster.local</code>, as listed in the IOCs table.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>ech0</category><category>github</category></item></channel></rss>