<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Openobserve — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/openobserve/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 20:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/openobserve/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenObserve SSRF via Improper IPv6 Validation</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-openobserve-ssrf/</link><pubDate>Tue, 07 Apr 2026 20:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-openobserve-ssrf/</guid><description>OpenObserve versions 0.70.3 and earlier are vulnerable to a server-side request forgery (SSRF) attack due to improper validation of IPv6 addresses in the validate_enrichment_url function, potentially allowing authenticated attackers to access internal services and retrieve sensitive cloud metadata.</description><content:encoded><![CDATA[<p>OpenObserve, a cloud-native observability platform, contains a server-side request forgery (SSRF) vulnerability (CVE-2026-39361) in versions 0.70.3 and earlier. The vulnerability resides in the <code>validate_enrichment_url</code> function within <code>src/handler/http/request/enrichment_table/mod.rs</code>. This function fails to properly block IPv6 addresses due to the Rust&rsquo;s <code>url</code> crate returning IPv6 addresses with surrounding brackets (e.g., &ldquo;[::1]&rdquo;) instead of without. This allows an authenticated attacker to bypass intended restrictions and access internal services that are normally blocked from external access. Successful exploitation can lead to the retrieval of sensitive IAM credentials via AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS on cloud deployments, and probing of internal network services on self-hosted deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker identifies the <code>validate_enrichment_url</code> function as a potential SSRF target.</li>
<li>The attacker crafts a malicious URL containing an IPv6 address with surrounding brackets (e.g., <code>http://[::1]</code>).</li>
<li>The attacker submits a request to the OpenObserve server, providing the malicious URL to the <code>validate_enrichment_url</code> function.</li>
<li>The <code>validate_enrichment_url</code> function fails to properly validate the IPv6 address due to the brackets.</li>
<li>The OpenObserve server initiates a request to the attacker-specified IPv6 address, bypassing intended access restrictions.</li>
<li>In a cloud environment, the attacker targets the AWS IMDSv1 endpoint (169.254.169.254) to retrieve IAM credentials.</li>
<li>The OpenObserve server retrieves the IAM credentials from the IMDSv1 endpoint and returns them to the attacker.</li>
<li>The attacker uses the stolen IAM credentials to gain unauthorized access to cloud resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can lead to significant consequences, especially in cloud deployments. An attacker can retrieve sensitive IAM credentials from cloud metadata services like AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS. These stolen credentials can then be used to gain unauthorized access to critical cloud resources, potentially leading to data breaches, service disruption, and financial losses. The vulnerability affects OpenObserve instances version 0.70.3 and earlier. The number of affected organizations is currently unknown, but any organization using a vulnerable version of OpenObserve is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenObserve to a version greater than 0.70.3 to patch CVE-2026-39361.</li>
<li>Monitor network connections originating from OpenObserve servers to internal IP addresses such as 169.254.169.254 using the provided Sigma rule to detect potential SSRF attempts.</li>
<li>Implement network segmentation and access controls to limit the impact of a successful SSRF attack, restricting access from OpenObserve servers to sensitive internal services.</li>
<li>Consider disabling IMDSv1 and migrating to IMDSv2 on AWS EC2 instances to mitigate the risk of IAM credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>openobserve</category><category>cloud</category><category>vulnerability</category></item></channel></rss>