Skip to content

fix: add URL validation in server.go#3368

Open
orbisai0security wants to merge 1 commit intov2ray:masterfrom
orbisai0security:fix-ssrf-private-ip-block-http-proxy
Open

fix: add URL validation in server.go#3368
orbisai0security wants to merge 1 commit intov2ray:masterfrom
orbisai0security:fix-ssrf-private-ip-block-http-proxy

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix high severity security issue in proxy/http/server.go.

Vulnerability

Field Value
ID V-001
Severity HIGH
Scanner multi_agent_ai
Rule V-001
File proxy/http/server.go:162
CWE CWE-918

Description: The HTTP proxy server's handleConnect and handlePlainHTTP functions accept destination addresses derived directly from client-supplied HTTP Host headers and CONNECT targets without validating them against private IP ranges (RFC-1918: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16), loopback (127.0.0.0/8), or link-local (169.254.0.0/16) addresses. This allows any attacker with network access to the proxy to use it as an SSRF vector to reach internal services, including cloud provider metadata endpoints.

Changes

  • proxy/http/server.go

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by Orbis Security AI
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant