Skip to content

Commit 6c34bbf

Browse files
1 parent 5d71882 commit 6c34bbf

File tree

3 files changed

+131
-33
lines changed

3 files changed

+131
-33
lines changed
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-8fxj-2g9q-8fjw",
4+
"modified": "2025-12-10T17:18:04Z",
5+
"published": "2025-12-10T00:30:22Z",
6+
"aliases": [
7+
"CVE-2025-65513"
8+
],
9+
"summary": "Fetch MCP Server has a Server-Side Request Forgery (SSRF) vulnerability",
10+
"details": "fetch-mcp v1.0.2 and before is vulnerable to Server-Side Request Forgery (SSRF) vulnerability, which allows attackers to bypass private IP validation and access internal network resources.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "mcp-fetch-server"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "1.0.2"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65513"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/Team-Off-course/MCP-Server-Vuln-Analysis/blob/main/CVE-2025-65513.md"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/zcaceres/fetch-mcp"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/zcaceres/fetch-mcp/blob/c662c8ac300f715e414a64766cd95cc9ec60a1b3/src/Fetcher.ts#L20"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://thorn-pheasant-6d8.notion.site/fetch-mcp-2853daf7b44180029ca5d56e03195736"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-918"
63+
],
64+
"severity": "MODERATE",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2025-12-10T17:18:04Z",
67+
"nvd_published_at": "2025-12-09T22:16:15Z"
68+
}
69+
}
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-wqv2-4wpg-8hc9",
4+
"modified": "2025-12-10T17:18:37Z",
5+
"published": "2025-12-10T17:18:37Z",
6+
"aliases": [],
7+
"summary": "Miniflux has an Open Redirect via protocol-relative redirect_url",
8+
"details": "### Summary\n`redirect_url` is treated as safe when `url.Parse(...).IsAbs()` is false. Protocol-relative URLs like `//ikotaslabs.com` have an empty scheme and pass that check, allowing post-login redirects to attacker-controlled sites.\n\n### Details\n- `url.Parse(\"//ikotaslabs.com\")` => empty Scheme, Host=\"ikotaslabs.com\".\n- `IsAbs()` returns false for `//ikotaslabs.com`, so the code treats it as allowed.\n- Browser resolves `//ikotaslabs.com` to current-origin scheme (e.g. `https://ikotaslabs.com`), enabling phishing flows after login.\n\n### PoC\n1. Send or visit: `http://localhost/login?redirect_url=//ikotaslabs.com` \n2. Complete normal login flow. \n3. After login the app redirects to `https://ikotaslabs.com` (or `http://` depending on origin).\n\n### Acknowledgements \nThis vulnerability was discovered using the automated vulnerability analysis tools **VulScribe** and **PwnML**. \nThe research and tool development were conducted with support from the **MITOU Advanced Program (未踏アドバンスト事業)**, \nadministered by the **Information-technology Promotion Agency (IPA), Japan**.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Go",
19+
"name": "miniflux.app/v2"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "2.2.15"
30+
}
31+
]
32+
}
33+
],
34+
"database_specific": {
35+
"last_known_affected_version_range": "<= 2.2.14"
36+
}
37+
}
38+
],
39+
"references": [
40+
{
41+
"type": "WEB",
42+
"url": "https://github.com/miniflux/v2/security/advisories/GHSA-wqv2-4wpg-8hc9"
43+
},
44+
{
45+
"type": "WEB",
46+
"url": "https://github.com/miniflux/v2/commit/76df99f3a3db234cf6b312be5e771485213d03c7"
47+
},
48+
{
49+
"type": "PACKAGE",
50+
"url": "https://github.com/miniflux/v2"
51+
}
52+
],
53+
"database_specific": {
54+
"cwe_ids": [
55+
"CWE-601"
56+
],
57+
"severity": "LOW",
58+
"github_reviewed": true,
59+
"github_reviewed_at": "2025-12-10T17:18:37Z",
60+
"nvd_published_at": null
61+
}
62+
}

advisories/unreviewed/2025/12/GHSA-8fxj-2g9q-8fjw/GHSA-8fxj-2g9q-8fjw.json

Lines changed: 0 additions & 33 deletions
This file was deleted.

0 commit comments

Comments
 (0)