Server-side Request Forgery (SSRF) Affecting prefect package, versions [,2.20.11) [3.0.0rc1,3.0.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PYTHON-PREFECT-8136231
  • published 1 Oct 2024
  • disclosed 1 Oct 2024
  • credit Chris Guidry

Introduced: 1 Oct 2024

CVE NOT AVAILABLE CWE-918 Open this link in a new tab

How to fix?

Upgrade prefect to version 2.20.11, 3.0.2 or higher.

Overview

prefect is a Prefect is a new workflow management system, designed for modern infrastructure and powered by the open-source Prefect Core workflow engine. Users organize Tasks into Flows, and Prefect takes care of the rest.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) when Prefect API is exposed to "external" users of any kind. An attacker can maliciously craft a notification URL that points to an internal API, resulting in potential information exposure, access to internal services, and private IP addresses.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
8.3 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    Present
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    High
  • Integrity (VI)
    Low
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None