GHSA-jqx4-9gpq-rppm

Suggest an improvement
Source
https://github.com/advisories/GHSA-jqx4-9gpq-rppm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-jqx4-9gpq-rppm/GHSA-jqx4-9gpq-rppm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-jqx4-9gpq-rppm
Published
2025-05-06T16:44:22Z
Modified
2025-05-06T16:44:22Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
@misskey-dev/summaly allows IP Filter Bypass via Redirect
Details

Summary

Due to a validation error in got.scpaping, it is possible to use an HTTP redirect to avoid IP filtering.

Details

In got.scpaping, Summaly first makes a HTTP HEAD request to the page being summarized. It then preforms private IP address checks on the HEAD response, then makes an additional HTTP GET request to the page being summarized. Unfortunately, since private IP address checks aren't performed on the GET response, the GET response can issue a HTTP redirect to a private IP address, which will succeed, regardless of if private IP addresses are allowed by Summaly.

PoC

With a simple Caddy webserver, you can get Summaly to summarize a page hosted via a local IP address:

@summaly-bypass-head {
    method HEAD
    path /summaly-bypass
}
@summaly-bypass-get {
    method GET
    path /summaly-bypass
}
header @summaly-bypass-head Content-Type "text/html"
respond @summaly-bypass-head 200
redir @summaly-bypass-get http://127.0.0.1:3080/

Impact

Using this bypass, an attacker can probe a victims internal network for HTTP services that aren't supposed to be exposed to the outside world. While they might only have read-only access through this, it may still be possible to extract sensitive information or be used to probe a network prior to attacking via other exploits without leaving a trace.

Database specific
{
    "github_reviewed_at": "2025-05-06T16:44:22Z",
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-346"
    ],
    "github_reviewed": true,
    "nvd_published_at": null
}
References

Affected packages

npm / @misskey-dev/summaly

Package

Name
@misskey-dev/summaly
View open source insights on deps.dev
Purl
pkg:npm/%40misskey-dev/summaly

Affected ranges

Type
SEMVER
Events
Introduced
5.1.0
Fixed
5.2.1