<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Aas-Ee — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/aas-ee/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 20:51:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/aas-ee/feed.xml" rel="self" type="application/rss+xml"/><item><title>Open-WebSearch SSRF Vulnerability in fetchWebContent Tool</title><link>https://feed.craftedsignal.io/briefs/2024-01-open-websearch-ssrf/</link><pubDate>Tue, 05 May 2026 20:51:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-open-websearch-ssrf/</guid><description>Open-WebSearch has a Server-Side Request Forgery (SSRF) vulnerability in the `fetchWebContent` MCP tool due to improper validation of IPv6 literals and lack of DNS resolution, allowing attackers to fetch arbitrary private-network URLs and receive the response body.</description><content:encoded><![CDATA[<p>Open-WebSearch is vulnerable to a Server-Side Request Forgery (SSRF) in the <code>fetchWebContent</code> tool. This vulnerability stems from two primary defects in the <code>isPublicHttpUrl</code> function within <code>src/utils/urlSafety.ts</code>. First, the function fails to recognize bracketed IPv6 literals, like <code>[::1]</code>, allowing them to bypass the private network checks. Second, the function lacks DNS resolution for hostnames, meaning that any attacker-controlled hostname resolving to a private IP address (e.g., 127.0.0.1) will pass the validation. Successful exploitation allows an attacker to make the server fetch content from internal resources. The vulnerability exists in version HEAD as of 2026-05-05. Because the tool returns the response body to the MCP caller, the SSRF is non-blind. The vulnerability is exploitable over stdio and is pre-auth when <code>enableHttpServer</code> is set.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends a POST request to the <code>/mcp</code> endpoint to initialize an MCP session, obtaining an <code>mcp-session-id</code>.</li>
<li>The attacker sends another POST request to <code>/mcp</code> with the <code>notifications/initialized</code> method and the obtained <code>mcp-session-id</code>.</li>
<li>The attacker crafts a malicious POST request to <code>/mcp</code> with the <code>tools/call</code> method to invoke the <code>fetchWebContent</code> tool.</li>
<li>The malicious request includes a URL containing a bracketed IPv6 literal (e.g., <code>http://[::ffff:7f00:1]:19999/internal</code>) or an attacker-controlled hostname resolving to a private IP address as the target.</li>
<li>The <code>isPublicHttpUrl</code> function fails to properly validate the URL due to the defects in IPv6 literal recognition and lack of DNS resolution.</li>
<li>The <code>fetchWebContent</code> tool uses <code>axios.get</code> to fetch content from the attacker-specified URL.</li>
<li>The response from the internal resource is retrieved and formatted as JSON.</li>
<li>The <code>fetchWebContent</code> tool returns the content to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This SSRF vulnerability allows an attacker to make the Open-WebSearch server fetch content from arbitrary private-network URLs. This includes AWS EC2 metadata endpoints, internal dashboards, services running on loopback, and RFC1918 neighbors. The vulnerability is pre-authentication when the <code>enableHttpServer</code> configuration is enabled, potentially leading to full system compromise or data exfiltration from internal services. Furthermore, the CORS <code>*</code> configuration on <code>/mcp</code> allows for DNS rebinding attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the <code>DetectOpenWebSearchSSRFIPv6</code> Sigma rule to detect attempts to exploit the IPv6 bypass vulnerability.</li>
<li>Deploy the <code>DetectOpenWebSearchfetchWebContent</code> Sigma rule to detect usage of the vulnerable fetchWebContent tool.</li>
<li>Restrict access to the <code>/mcp</code> endpoint by implementing authentication and access controls to prevent unauthorized tool execution, as mentioned in the overview.</li>
<li>Monitor network connections originating from the Open-WebSearch server to identify any unexpected or unauthorized connections to internal resources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>open-websearch</category><category>vulnerability</category></item></channel></rss>