CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
91.4%
Skipper prior to version v0.13.236 is vulnerable to server-side request forgery (SSRF). An attacker can exploit a vulnerable version of proxy to access the internal metadata server or other unauthenticated URLs by adding an specific header (X-Skipper-Proxy) to the http request.
The problem was patched in version https://github.com/zalando/skipper/releases/tag/v0.13.237.
Users need to upgrade to skipper >=v0.13.237
.
Use dropRequestHeader("X-Skipper-Proxy")
filter
https://github.com/zalando/skipper/releases/tag/v0.13.237
If you have any questions or comments about this advisory:
packetstormsecurity.com/files/171546/X-Skipper-Proxy-0.13.237-Server-Side-Request-Forgery.html
skipper.com
zalando.com
gist.github.com/Fadavvi/9fffcfa4aaa9e25b77cfe7b3044b2857#file-cve-2022-38580
github.com/zalando/skipper
github.com/zalando/skipper/commit/842634347da8fe77e396f66edea79d329fd72130
github.com/zalando/skipper/pull/2058
github.com/zalando/skipper/releases/tag/v0.13.237
github.com/zalando/skipper/security/advisories/GHSA-f2rj-m42r-6jm2
nvd.nist.gov/vuln/detail/CVE-2022-38580
pastebin.com/dXxpgPAK
pkg.go.dev/vuln/GO-2022-1086