GHSA-vrjc-q2fh-6x9h

Suggest an improvement
Source
https://github.com/advisories/GHSA-vrjc-q2fh-6x9h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-vrjc-q2fh-6x9h/GHSA-vrjc-q2fh-6x9h.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vrjc-q2fh-6x9h
Aliases
Published
2026-01-05T22:55:12Z
Modified
2026-02-03T03:14:15.545158Z
Severity
  • 7.9 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L CVSS Calculator
Summary
Spinnaker vulnerable to SSRF due to improper restrictions on http from user input
Details

Impact

The primary impact is allowing users to fetch data from a remote URL. This data can be then injected into Spinnaker pipelines via helm or other methods to extract things LIKE idmsv1 authentication data. This ALSO includes calling INTERNAL Spinnaker API's via a get and similar endpoints. Further, depending upon the artifact configuration, auth data may be exposed to arbitrary endpoints (e.g. GitHub auth headers) leading to credentials exposure.

To trigger this, a Spinnaker installation MUST have: * An artifact enabled that allows user input. This includes GitHub file artifacts, BitBucket, GitLab, HTTP artifacts and similar artifact providers. JUST enabling the http artifact provider will add a "no-auth" http provider that could be used to extract link local data (e.g. AWS Metadata information). * A system that can consume the output of these artifacts. E.g. Rosco helm can use this to fetch values data. K8s account manifests if the API returns JSON can be used to inject that data into the pipeline itself though the pipeline would fail.

To note, due to the way the URLs are viable to be injected, CERTAIN systems can be used to provide DOS attacks on Spinnaker itself. These would NOT compromise the system per se, given restarts and timeout configuration, but could lead to internal attacks by a Spinnaker user against Spinnaker services. An example is that an artifact fetch reference could return an infinite response data feed or similar that can act as a DOS attack. It's recommended to set strong limits on the various http limits AND artifact URLs to known valid URLs.

Patches

Fixed in clouddriver versiosn 2025.2.3, 2025.1.5, 2025.0.9. Impacts all prior Spinnaker releases.

Workarounds

Disable HTTP account types that allow user input of a given URL. This is probably not feasible in MOST cases. Git, Docker and other artifact account types with explicit URL configurations bypass this limitation and should be safe as they limit artifact URL loading.

Alternatively using one of the various vendors which provide OPA policies to restrict pipelines from accessing or saving a pipeline with invalid URLs.

Database specific
{
    "nvd_published_at": "2026-01-05T22:15:50Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2026-01-05T22:55:12Z",
    "cwe_ids": [
        "CWE-20",
        "CWE-523",
        "CWE-918"
    ]
}
References

Affected packages

Maven / io.spinnaker.clouddriver:clouddriver-artifacts

Package

Name
io.spinnaker.clouddriver:clouddriver-artifacts
View open source insights on deps.dev
Purl
pkg:maven/io.spinnaker.clouddriver/clouddriver-artifacts

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2025.1.6

Affected versions

Other
main-5
main-6
main-7
main-8
main-9
main-10
main-11
main-12
main-13
main-14
main-15
main-16
main-17
main-18
main-19
main-20
main-21
main-22
main-23
main-24
main-30
main-31
main-32
main-33
main-34
main-35
main-36
main-37
main-38
main-39
main-40
main-41
main-42
main-43
main-44
main-45
main-46
main-47
main-48
main-49
main-50
main-51
main-52
main-53
main-55
main-56
main-57
main-58
main-59
main-60
main-61
main-62
main-63
main-64
main-65
main-66
main-67
main-68
main-69
main-70
main-71
main-72
main-73
main-74
main-75
main-76
main-77
main-78
main-79
main-80
main-81
main-84
main-85
main-86
main-87
main-88
main-89
main-90
main-91
main-92
main-93
main-94
main-95
main-96
main-97
main-98
main-99
main-100
main-101
main-102
main-103
main-104
main-105
main-106
main-107
main-108
main-109
main-111
main-113
main-114
main-115
main-116
main-117
main-118
main-119
main-120
main-121
main-122
main-123
main-124
main-125
main-126
main-127
main-128
main-129
main-130
main-131
main-132
main-133
main-134
main-135
main-136
main-137
main-139
main-140
main-141
main-142
main-143
main-144
main-145
main-146
main-147
main-148
main-149
5.*
5.74.0
5.74.2
5.74.3
5.74.4
5.74.5
5.74.6
5.74.7
5.74.8
5.75.0
5.76.0
5.76.1
5.76.2
5.76.3
5.76.4
5.76.5
5.76.6
5.76.7
5.76.8
5.76.9
5.77.0
5.78.0
5.78.1
5.78.2
5.78.3
5.78.4
5.78.5
5.78.6
5.78.7
5.78.8
5.78.9
5.78.10
5.78.11
5.78.12
5.78.13
5.79.0
5.80.0
5.80.1
5.80.2
5.80.3
5.80.4
5.80.5
5.80.6
5.80.7
5.80.8
5.80.9
5.81.0
5.81.1
5.81.2
5.82.0
5.82.1
5.82.2
5.83.0
5.83.1
5.83.2
5.83.3
5.83.4
5.84.0
5.85.0
5.85.1
5.85.2
5.85.3
5.85.4
5.85.5
5.86.0
5.86.1
5.86.2
5.86.3
5.86.4
5.87.0
5.88.0
5.89.0
5.90.0
5.90.1
5.90.2
5.90.5
5.91.0
5.91.1
5.91.2
5.91.3
5.91.4
5.91.5
5.91.6
5.91.7
5.92.0
5.93.0
5.94.0
5.95.0
2025.*
2025.0-0
2025.0.0
2025.0-1
2025.0-2
2025.0-3
2025.0-4
2025.0-5
2025.0-6
2025.0-7
2025.0-8
2025.0-9
2025.0-10
2025.0-11
2025.0-12
2025.0-13
2025.0-14
2025.0-15
2025.0-16
2025.0-17
2025.0-18
2025.0-19
2025.0-20
2025.0-21
2025.0-22
2025.0-23
2025.0-24
2025.0-25
2025.0.1
2025.0.2
2025.0.3
2025.0.4
2025.0.5
2025.0.6
2025.0.7
2025.0.8
2025.1-0
2025.1.0
2025.1-1
2025.1-2
2025.1-3
2025.1-4
2025.1-5
2025.1-6
2025.1-7
2025.1-8
2025.1-9
2025.1-10
2025.1-11
2025.1-12
2025.1-13
2025.1-14
2025.1-15
2025.1-16
2025.1-17
2025.1-18
2025.1-19
2025.1-20
2025.1-21
2025.1-22
2025.1.1
2025.1.2
2025.1.3
2025.1.4
2025.1.5

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-vrjc-q2fh-6x9h/GHSA-vrjc-q2fh-6x9h.json"

Maven / io.spinnaker.clouddriver:clouddriver-artifacts

Package

Name
io.spinnaker.clouddriver:clouddriver-artifacts
View open source insights on deps.dev
Purl
pkg:maven/io.spinnaker.clouddriver/clouddriver-artifacts

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2025.2.0
Fixed
2025.2.3

Affected versions

2025.*
2025.2-0
2025.2.0
2025.2-1
2025.2-2
2025.2-3
2025.2-4
2025.2-5
2025.2-6
2025.2-7
2025.2-8
2025.2-9
2025.2-10
2025.2-11
2025.2-12
2025.2-13
2025.2-14
2025.2-15
2025.2-16
2025.2.1
2025.2.2

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-vrjc-q2fh-6x9h/GHSA-vrjc-q2fh-6x9h.json"