<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ssrfcheck (&lt; 1.2.0) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/ssrfcheck--1.2.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 20:29:06 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/ssrfcheck--1.2.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>ssrfcheck SSRF Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-ssrfcheck-bypass/</link><pubDate>Tue, 05 May 2026 20:29:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ssrfcheck-bypass/</guid><description>The `ssrfcheck` npm package is vulnerable to SSRF bypass due to an incomplete denylist of IP addresses. The package fails to classify the reserved IP address space 224.0.0.0/4 (Multicast) as invalid, allowing potential SSRF attacks. All versions up to and including 1.1.1 are affected. A patch has been released in version 1.2.0.</description><content:encoded><![CDATA[<p>The <code>ssrfcheck</code> npm package, designed to protect against Server-Side Request Forgery (SSRF) attacks, contains a vulnerability due to an incomplete IP address denylist. Specifically, the package fails to classify the reserved IP address space <code>224.0.0.0/4</code> (Multicast) as invalid. This omission allows attackers to bypass the intended SSRF protection mechanisms. The vulnerability affects all versions of <code>ssrfcheck</code> up to and including version <code>1.1.1</code>. This issue came to light in early May 2026. Although multicast addresses are typically used for local network communication, their acceptance by <code>ssrfcheck</code> deviates from established security practices and could be exploited in certain SSRF scenarios. The maintainers have released version 1.2.0 to address this vulnerability, incorporating the missing reserved IP range into the denylist.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a web application that utilizes the vulnerable <code>ssrfcheck</code> package for URL validation.</li>
<li>The attacker crafts a malicious URL containing an address within the <code>224.0.0.0/4</code> IP range (e.g., <code>239.255.255.250</code>).</li>
<li>The web application uses <code>ssrfcheck</code>&rsquo;s <code>isSSRFSafeURL</code> function to validate the URL.</li>
<li>Due to the missing IP range in <code>ssrfcheck</code>&rsquo;s denylist, the function incorrectly returns <code>true</code>, indicating the URL is safe.</li>
<li>The web application proceeds to make a request to the attacker-controlled multicast address.</li>
<li>The request is routed within the internal network, potentially targeting internal services or resources that are not exposed to the public internet.</li>
<li>The attacker gains unauthorized access to sensitive data or functionality within the internal network.</li>
<li>The attacker exfiltrates the obtained information or uses the compromised service as a pivot point for further attacks within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability could allow attackers to bypass intended security controls and access internal network resources. While the use of multicast addresses may limit the scope of potential attacks, it still presents a risk of unauthorized access to sensitive information and systems. The vulnerability affects all users of the <code>ssrfcheck</code> package up to version 1.1.1. Web applications relying on <code>ssrfcheck</code> for SSRF protection are vulnerable until the package is updated to version 1.2.0 or later.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>ssrfcheck</code> package to version 1.2.0 or later to remediate the vulnerability.</li>
<li>Deploy the Sigma rule <code>SSRFCheck_Multicast_Bypass</code> to detect attempts to exploit this vulnerability in your environment.</li>
<li>Review and audit any custom SSRF protection mechanisms that may be in place to ensure they adequately address reserved IP address spaces.</li>
<li>Monitor network traffic for connections to multicast addresses originating from web applications that rely on URL validation.</li>
<li>Update your vulnerability management system to include CVE-2025-8267 for tracking and remediation purposes.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks, even if the vulnerable package is exploited.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>vulnerability</category><category>npm</category></item></channel></rss>