Skip to content

Server Side Request Forgery in Ziti Console

High
mikegorman-nf published GHSA-fqxh-vfv5-8qjp Mar 3, 2025

Package

ziti-console (OpenZiti)

Affected versions

< 3.7.1

Patched versions

3.7.1

Description

An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability OWASP. By exploiting this flaw, an attacker can force the server to make requests to arbitrary internal or external endpoints, including cloud metadata endpoints (e.g., http://169.254.169.254/latest/meta-data/ in AWS). Such behavior can lead to the exfiltration of sensitive information, including cloud instance metadata, credentials, and other critical internal data.

Due to its potential to compromise internal systems and exfiltrate sensitive cloud metadata, this vulnerability is assessed as high severity. An attacker exploiting this SSRF flaw might gain unauthorized access to sensitive information and escalate privileges, which could result in a broader system compromise.

The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions.

Severity

High

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

CVE ID

CVE-2025-27501

Weaknesses

Server-Side Request Forgery (SSRF)

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. Learn more on MITRE.

Credits