<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-42352 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-42352/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-42352/feed.xml" rel="self" type="application/rss+xml"/><item><title>pygeoapi Unauthenticated SSRF Vulnerability in OGC API - Processes Subscriber</title><link>https://feed.craftedsignal.io/briefs/2024-01-pygeoapi-ssrf/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pygeoapi-ssrf/</guid><description>pygeoapi versions 0.23.0 to 0.23.2 contain an unauthenticated server-side request forgery (SSRF) vulnerability where OGC API process execution requests can use the subscriber object to make requests to internal HTTP services, which is resolved in version 0.23.3 by disabling internal requests by default.</description><content:encoded><![CDATA[<p>pygeoapi versions 0.23.0, 0.23.1, and 0.23.2 are vulnerable to Server-Side Request Forgery (SSRF). The vulnerability stems from the OGC API - Processes functionality, specifically how it handles the <code>subscriber</code> object during process execution. An unauthenticated attacker can exploit this flaw to send requests to internal HTTP services, potentially gaining access to sensitive information or triggering unintended actions within the internal network. This issue was patched in version 0.23.3 by disabling internal HTTP requests by default, unless explicitly allowed in the configuration. The patch includes the introduction of an <code>allow_internal_requests</code> directive for administrators who require this functionality. This vulnerability poses a significant risk to organizations using affected versions of pygeoapi.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a pygeoapi instance running a vulnerable version (0.23.0 - 0.23.2).</li>
<li>The attacker crafts a malicious OGC API process execution request.</li>
<li>Within the request, the attacker manipulates the <code>subscriber</code> object.</li>
<li>The <code>subscriber</code> object is configured to target an internal HTTP service by specifying the internal service&rsquo;s address.</li>
<li>pygeoapi processes the request without proper validation of the <code>subscriber</code> object&rsquo;s target.</li>
<li>pygeoapi initiates an HTTP request to the attacker-specified internal service.</li>
<li>The internal service responds to pygeoapi.</li>
<li>pygeoapi may then relay information received from the internal service back to the attacker, or the attacker might be able to trigger actions based on the SSRF.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an unauthenticated attacker to interact with internal HTTP services that should not be publicly accessible. This can lead to the disclosure of sensitive information, such as internal configurations, API keys, or customer data. The attacker may also be able to trigger actions on the internal services, potentially leading to service disruption or data manipulation. The severity of the impact depends on the nature and security posture of the internal services exposed by this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to pygeoapi version 0.23.3 or later to remediate CVE-2026-42352.</li>
<li>Apply the provided patch <a href="https://github.com/geopython/pygeoapi/commit/3a63f5b0cc6275e3ae0edb47726b13a43cdd90ef">3a63f5b0cc6275e3ae0edb47726b13a43cdd90ef</a> if upgrading is not immediately feasible.</li>
<li>If upgrading or patching is not immediately feasible, disable process-based resources in the pygeoapi configuration as a workaround.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>pygeoapi</category><category>ssrf</category><category>ogc api</category><category>cve-2026-42352</category><category>vulnerability</category><category>cloud</category></item></channel></rss>