<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-45568 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45568/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 15:16:52 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45568/feed.xml" rel="self" type="application/rss+xml"/><item><title>zrok ProxyShare SSRF Vulnerability (CVE-2026-45568)</title><link>https://feed.craftedsignal.io/briefs/2026-05-zrok-ssrf/</link><pubDate>Tue, 19 May 2026 15:16:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-zrok-ssrf/</guid><description>The zrok Python SDK `ProxyShare` is vulnerable to server-side request forgery (SSRF) via CVE-2026-45568. When a user sends a request with an absolute URL in the path, the Flask handler passes that path to `urllib.parse.urljoin`, which replaces the configured target host with the user-supplied host, causing the proxy to send the request to an attacker-chosen URL.</description><content:encoded><![CDATA[<p>The zrok Python SDK, specifically the <code>ProxyShare</code> functionality, is susceptible to a server-side request forgery (SSRF) vulnerability, identified as CVE-2026-45568. This flaw exists due to the use of <code>urllib.parse.urljoin</code> without proper sanitization of the input path. An attacker can exploit this by crafting a request containing an absolute URL in the path. The Flask handler then passes this malicious path to <code>urljoin</code>, which incorrectly combines it with the target URL. This results in the proxy forwarding the request to an attacker-controlled server instead of the intended target, potentially leading to information disclosure or internal network access. The vulnerability affects zrok versions 0.4.47 through 1.1.11. This matters for defenders because it allows an attacker to bypass intended access controls and potentially gain access to internal resources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Alice configures a zrok <code>ProxyShare</code> with a defined target URL, for example, <code>https://internal-api.example.com</code>.</li>
<li>Bob identifies the exposed <code>ProxyShare</code> endpoint.</li>
<li>Bob crafts a malicious request to the <code>ProxyShare</code> endpoint, including an absolute URL in the path, such as <code>/http://127.0.0.1:19190/metadata</code>.</li>
<li>The Flask application routes the request to the <code>proxy</code> function.</li>
<li>The <code>proxy</code> function uses <code>urllib.parse.urljoin(self.target, path)</code> to construct the outbound URL. Due to the absolute URL in <code>path</code>, <code>urljoin</code> resolves to <code>http://127.0.0.1:19190/metadata</code> instead of a URL on Alice&rsquo;s intended target.</li>
<li>The <code>requests.request</code> function sends the crafted request to the attacker-controlled URL (<code>http://127.0.0.1:19190/metadata</code>).</li>
<li>The attacker&rsquo;s server (<code>127.0.0.1:19190</code>) receives the request, potentially including sensitive information or internal headers.</li>
<li>The attacker&rsquo;s server responds, and the response is relayed back to Bob, completing the SSRF attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45568 allows an attacker to perform SSRF attacks against zrok deployments. This can enable the attacker to access internal services, read sensitive data from internal endpoints, or potentially perform actions on behalf of the zrok server. The impact can range from information disclosure to full compromise of internal systems, depending on the services accessible from the zrok server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade zrok to a version beyond 1.1.11 to patch CVE-2026-45568.</li>
<li>Deploy the Sigma rule &ldquo;Detect zrok SSRF Attempt via Absolute URL in Request Path&rdquo; to detect exploitation attempts against vulnerable zrok instances.</li>
<li>Monitor web server logs for requests containing absolute URLs in the path to the zrok proxy endpoint to identify potential SSRF attempts, referencing the attack chain described above.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>cve</category><category>cve-2026-45568</category><category>zrok</category><category>proxyshare</category></item></channel></rss>