File tree Expand file tree Collapse file tree 1 file changed +14
-1
lines changed Expand file tree Collapse file tree 1 file changed +14
-1
lines changed Original file line number Diff line number Diff line change
1
+ /** ATTN: SECURITY RESEARCHERS
2
+ * To Security researchers about to submit an SSRF report CVE - please don't.
3
+ * We are aware that the code below is does not defend against any of the thousands of ways
4
+ * you can map a hostname to another IP. The code below does not have intention of blocking this
5
+ * and is simply to prevent the user from accidentally putting in non-valid websites, which is all this protects
6
+ * since _all urls must be submitted by the user anyway_ and cannot be done with authentication and manager or admin roles.
7
+ * If an attacker has those roles then the system is already vulnerable and this is not a primary concern.
8
+ *
9
+ * We have gotten this report may times, marked them as duplicate or information and continue to get them. We communicate
10
+ * already that deployment (and security) of an instance is on the deployer and system admin deploying it. This would include
11
+ * isolation, firewalls, and the general security of the instance.
12
+ */
13
+
1
14
const VALID_PROTOCOLS = [ "https:" , "http:" ] ;
2
15
const INVALID_OCTETS = [ 192 , 172 , 10 , 127 ] ;
3
16
@@ -19,7 +32,7 @@ function validURL(url) {
19
32
if ( ! VALID_PROTOCOLS . includes ( destination . protocol ) ) return false ;
20
33
if ( isInvalidIp ( destination ) ) return false ;
21
34
return true ;
22
- } catch { }
35
+ } catch { }
23
36
return false ;
24
37
}
25
38
You can’t perform that action at this time.
0 commit comments