<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>No_proxy — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/no_proxy/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 17:32:19 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/no_proxy/feed.xml" rel="self" type="application/rss+xml"/><item><title>Axios NO_PROXY Hostname Normalization Bypass Leads to SSRF</title><link>https://feed.craftedsignal.io/briefs/2024-01-axios-ssrf/</link><pubDate>Thu, 09 Apr 2026 17:32:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-axios-ssrf/</guid><description>Axios is vulnerable to a NO_PROXY hostname normalization bypass leading to SSRF, where requests to loopback addresses like `localhost.` or `[::1]` bypass `NO_PROXY` rules, allowing attackers to force requests through a proxy and potentially exfiltrate sensitive data.</description><content:encoded><![CDATA[<p>Axios, a popular HTTP client for Node.js, is susceptible to a NO_PROXY bypass vulnerability due to incorrect hostname normalization. This flaw, confirmed in version 1.12.2 and affecting all versions prior to 1.15.0, arises from the application&rsquo;s failure to properly handle hostnames with trailing dots (e.g., <code>localhost.</code>) or IPv6 literals (e.g., <code>[::1]</code>) when evaluating <code>NO_PROXY</code> rules.  Instead of performing normalization as recommended by RFC standards, Axios conducts literal string comparisons. This oversight allows attackers to circumvent intended <code>NO_PROXY</code> configurations and force requests through an attacker-controlled proxy, even when loopback or internal services are meant to be protected. The vulnerability could be exploited to bypass SSRF mitigations, potentially enabling exfiltration of sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an application using a vulnerable version of Axios and relies on <code>NO_PROXY</code> for loopback protection.</li>
<li>The attacker crafts a malicious URL targeting a loopback address (e.g., <code>http://localhost.:8080/</code> or <code>http://[::1]:8080/</code>).</li>
<li>The vulnerable Axios instance processes the URL without proper hostname normalization.</li>
<li>Due to the lack of normalization, the <code>NO_PROXY</code> check fails to recognize <code>localhost.</code> or <code>[::1]</code> as loopback addresses.</li>
<li>Axios incorrectly routes the request through a configured proxy server, which could be controlled by the attacker.</li>
<li>The attacker-controlled proxy receives the request and can forward it to the intended internal service.</li>
<li>The internal service responds to the proxy.</li>
<li>The attacker-controlled proxy captures the response data, potentially containing sensitive information, and can exfiltrate it.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Applications that depend on <code>NO_PROXY</code> settings to safeguard loopback or internal access are vulnerable to SSRF attacks. Attackers can exploit this flaw to force Axios to send local traffic through an attacker-controlled proxy server. This bypasses SSRF mitigations that rely on <code>NO_PROXY</code> rules, allowing the potential exfiltration of sensitive information from internal services via the compromised proxy.  The number of affected applications is potentially large, given the widespread use of Axios in Node.js environments. Successful exploitation could lead to unauthorized access to sensitive internal resources and data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Axios to version 1.15.0 or later to address the vulnerability (CVE-2025-62718).</li>
<li>Deploy the Sigma rule <code>Detect Axios SSRF via NO_PROXY Bypass</code> to identify attempts to exploit this vulnerability.</li>
<li>Inspect web server logs for requests containing loopback addresses with trailing dots or bracketed IPv6 literals to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>no_proxy</category><category>axios</category><category>hostname_normalization</category></item></channel></rss>