<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Movary — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/movary/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 18 Apr 2026 00:16:38 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/movary/feed.xml" rel="self" type="application/rss+xml"/><item><title>Movary SSRF Vulnerability (CVE-2026-40348)</title><link>https://feed.craftedsignal.io/briefs/2026-04-movary-ssrf/</link><pubDate>Sat, 18 Apr 2026 00:16:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-movary-ssrf/</guid><description>Movary versions before 0.71.1 are vulnerable to server-side request forgery (SSRF) via the `/settings/jellyfin/server-url-verify` endpoint, allowing authenticated users to probe internal network resources.</description><content:encoded><![CDATA[<p>Movary, a self-hosted web application for tracking and rating movies, is susceptible to a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-40348) in versions prior to 0.71.1. This flaw allows authenticated users to manipulate the <code>/settings/jellyfin/server-url-verify</code> endpoint to initiate server-side HTTP requests to arbitrary internal targets. The application uses the Guzzle HTTP client to send requests based on a user-supplied URL, to which <code>/system/info/public</code> is appended. The absence of input validation on the target URL allows attackers to bypass intended restrictions and access internal network resources. This vulnerability enables threat actors to perform internal reconnaissance activities such as host discovery, port scanning, and service fingerprinting. Successful exploitation can lead to further compromise by exposing internal administrative interfaces or cloud metadata endpoints.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Movary web application with a valid user account.</li>
<li>The attacker crafts a malicious URL targeting an internal resource, such as <code>http://127.0.0.1/</code>.</li>
<li>The attacker sends a <code>POST</code> request to <code>/settings/jellyfin/server-url-verify</code> with the crafted URL as the <code>serverUrl</code> parameter.</li>
<li>The Movary server receives the request and appends <code>/system/info/public</code> to the user-provided URL.</li>
<li>The Movary server uses the Guzzle HTTP client to initiate an HTTP request to the modified URL (e.g., <code>http://127.0.0.1/system/info/public</code>).</li>
<li>The internal service at the targeted IP address responds to the Movary server.</li>
<li>Based on the HTTP response code and content, the attacker can infer the existence and status of internal services. This allows for port scanning and service fingerprinting.</li>
<li>The attacker leverages discovered services to escalate privileges, potentially accessing sensitive data or internal administrative panels.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SSRF vulnerability (CVE-2026-40348) in Movary can enable attackers to discover internal network infrastructure and identify vulnerable services. This can allow attackers to gain unauthorized access to sensitive information, pivot to other internal systems, or perform other malicious activities. Although no specific victim count is given, the impact of this vulnerability is potentially high for any organization using a vulnerable version of Movary.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Movary to version 0.71.1 or later to patch the SSRF vulnerability (CVE-2026-40348).</li>
<li>Deploy the Sigma rule <code>Detect Movary SSRF Attempt</code> to identify potential exploitation attempts in web server logs.</li>
<li>Implement network segmentation and access controls to restrict access to sensitive internal services, limiting the impact of potential SSRF attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-40348</category><category>movary</category><category>web-application</category></item></channel></rss>