Server-Side Request Forgery (SSRF) Affecting truelayer.client package, versions [,1.6.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (39th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DOTNET-TRUELAYERCLIENT-6210163
  • published31 Jan 2024
  • disclosed30 Jan 2024
  • creditfoldedbits

Introduced: 30 Jan 2024

CVE-2024-23838  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade TrueLayer.Client to version 1.6.0 or higher.

Overview

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) via the process of fetching payment or payment provider information. An attacker can gain control over the destination URL of the HttpClient used in the API classes, leading to requests to unexpected resources on local networks or the internet, which could result in information disclosure.

Note:

This is only exploitable if strict egress rules limiting the destinations to which requests can be made are not in place, and if strict validation is not applied to any user input passed to the library.

Workaround

The issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the library.

References

CVSS Scores

version 3.1