<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ech0 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ech0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 03 Apr 2026 03:30:53 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ech0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Ech0 Unauthenticated Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-ech0-ssrf/</link><pubDate>Fri, 03 Apr 2026 03:30:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ech0-ssrf/</guid><description>Ech0 is vulnerable to Server-Side Request Forgery (SSRF) due to an unauthenticated API endpoint (`/api/website/title`) that fetches website titles from user-controlled URLs, lacking proper validation and TLS verification, allowing attackers to access internal resources and potentially cause denial of service.</description><content:encoded><![CDATA[<p>The Ech0 application suffers from an unauthenticated Server-Side Request Forgery (SSRF) vulnerability in its website preview feature. The <code>/api/website/title</code> endpoint, intended to fetch website titles, accepts a fully attacker-controlled URL without authentication. This allows anyone who can reach the Ech0 instance to force the server to make HTTP/HTTPS requests to arbitrary URLs. The application lacks a host allowlist, SSRF filter, and disables TLS certificate validation (<code>InsecureSkipVerify: true</code>). The backend reads the full HTML body into memory, which combined with enabled HTTP redirect following and the insecure TLS setting, allows attackers to target internal services and potentially cause a denial of service. The vulnerability is present in Ech0 versions prior to 1.4.8-0.20260401031029-4ca56fea5ba4.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an Ech0 instance and the <code>/api/website/title</code> endpoint.</li>
<li>The attacker crafts a malicious URL targeting an internal resource or a service on the Ech0 server&rsquo;s network.</li>
<li>The attacker sends an unauthenticated GET request to <code>/api/website/title</code> with the <code>website_url</code> parameter set to the malicious URL (e.g., <code>http://127.0.0.1:6277/api/website/title?website_url=http://host.docker.internal:9999/poc_ssrf_proof.html</code>).</li>
<li>The Ech0 server, lacking proper validation, makes an HTTP(S) request to the attacker-specified URL using <code>internal/util/http/http.go</code>.</li>
<li>If the targeted URL redirects, the Ech0 server follows the redirect due to the default <code>http.Client</code> behavior.</li>
<li>The Ech0 server reads the entire response body into memory using <code>io.ReadAll</code>, potentially leaking sensitive information or causing a denial of service if the response is large.</li>
<li>The Ech0 server parses the HTML body looking for the title and returns the title, or an error message, to the attacker.</li>
<li>The attacker gains access to information from internal services or causes a denial-of-service condition by exhausting server resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This SSRF vulnerability allows unauthenticated attackers to force the Ech0 server to make HTTP(S) requests to internal or reserved targets reachable from the server&rsquo;s network. A successful attack can lead to information disclosure, such as leaking cloud metadata from <code>169.254.169.254</code>-class endpoints, or access to internal services that are not exposed to the public internet. The <code>io.ReadAll</code> function makes the Ech0 server susceptible to denial-of-service attacks if the attacker provides a URL that returns a large response. The number of victims depends on the deployment of the Ech0 application and the accessibility of internal resources from the Ech0 server&rsquo;s network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Ech0 SSRF via Website Title API</code> to detect attempts to exploit this vulnerability by monitoring requests to the <code>/api/website/title</code> endpoint with suspicious URLs.</li>
<li>Block access to internal metadata endpoints like <code>169.254.169.254</code> from the Ech0 server if not explicitly required, mitigating the risk of cloud metadata exposure.</li>
<li>Apply the patch by upgrading to Ech0 version 1.4.8-0.20260401031029-4ca56fea5ba4 or later, addressing the underlying code flaws (CVE-2026-35036).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>ech0</category><category>web-application</category></item></channel></rss>