<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Curl_cffi — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/curl_cffi/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 03 Apr 2026 21:36:44 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/curl_cffi/feed.xml" rel="self" type="application/rss+xml"/><item><title>curl_cffi SSRF Vulnerability via Redirects</title><link>https://feed.craftedsignal.io/briefs/2026-04-curl-cffi-ssrf/</link><pubDate>Fri, 03 Apr 2026 21:36:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-curl-cffi-ssrf/</guid><description>curl_cffi versions before 0.15.0 are vulnerable to server-side request forgery (SSRF) due to unrestricted redirects to internal IP ranges, potentially enabling access to sensitive internal resources and cloud metadata.</description><content:encoded><![CDATA[<p>The curl_cffi library, a Python binding for libcurl, is susceptible to a server-side request forgery (SSRF) vulnerability in versions prior to 0.15.0. This flaw stems from the library&rsquo;s unrestricted handling of redirects, allowing attacker-controlled URLs to redirect requests to internal IP ranges and services. An attacker can exploit this behavior to access sensitive information such as cloud metadata or bypass network controls. The vulnerability is triggered because curl_cffi automatically follows redirects (CURLOPT_FOLLOWLOCATION = 1) without validating the destination. Additionally, the TLS impersonation feature in curl_cffi can further obscure malicious requests by mimicking legitimate browser traffic, potentially bypassing TLS-based filtering mechanisms. This issue is similar to other redirect-based SSRF vulnerabilities, like CVE-2025-68616.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a curl_cffi application vulnerable to SSRF.</li>
<li>The attacker crafts a malicious URL pointing to an attacker-controlled server (attacker.example).</li>
<li>The victim application uses curl_cffi to request the attacker-controlled URL.</li>
<li>The attacker&rsquo;s server responds with an HTTP 302 redirect to an internal IP address (e.g., 169.254.169.254, the cloud metadata endpoint).</li>
<li>curl_cffi automatically follows the redirect without validation.</li>
<li>The request is sent to the internal IP address, bypassing external access controls.</li>
<li>The internal service (e.g., cloud metadata API) responds with sensitive information.</li>
<li>The attacker retrieves the sensitive information from the victim application&rsquo;s logs or response data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to access internal network services and sensitive cloud metadata. This can lead to the exposure of API keys, credentials, and other confidential information. The impact can range from unauthorized access to internal applications and data to potential compromise of cloud infrastructure. All applications using curl_cffi versions before 0.15.0 are vulnerable. The severity is high due to the potential for significant data breaches and infrastructure compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to curl_cffi version 0.15.0 or later to patch CVE-2026-33752.</li>
<li>Implement server-side input validation to prevent passing attacker-controlled URLs to curl_cffi.</li>
<li>Monitor network traffic for connections to internal IP ranges (127.0.0.1, 169.254.0.0/16) originating from processes using curl_cffi.  Create a network_connection rule to detect this activity.</li>
<li>Inspect web server logs for HTTP 302 redirects to internal IP addresses, which could indicate SSRF attempts. Deploy a webserver rule to detect this.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>curl_cffi</category><category>cloud</category></item></channel></rss>