Server-side Request Forgery (SSRF) Affecting prefect package, versions [,2.20.11) [3.0.0rc1,3.0.2)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-PREFECT-8136231
- published 1 Oct 2024
- disclosed 1 Oct 2024
- credit Chris Guidry
How to fix?
Upgrade prefect
to version 2.20.11, 3.0.2 or higher.
Overview
prefect is a Prefect is a new workflow management system, designed for modern infrastructure and powered by the open-source Prefect Core workflow engine. Users organize Tasks into Flows, and Prefect takes care of the rest.
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) when Prefect API is exposed to "external" users of any kind. An attacker can maliciously craft a notification URL that points to an internal API, resulting in potential information exposure, access to internal services, and private IP addresses.