-
CVSS Score
-The vulnerability stems from missing network access controls in two key areas: 1) HTTP client transport creation (newDestinationTripper/getTransport) that didn't restrict target networks, and 2) DNS resolution (NewDNSCache/DialContext) that allowed internal IP resolution. The patch added allow/deny CIDR checks in both components. The affected functions directly handle outbound connections and DNS lookups without proper network segmentation controls in vulnerable versions, making them the root cause of SSRF possibilities. High confidence comes from explicit security controls being added in these exact functions in the patch.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/matrix-org/gomatrixserverlib | go | <= 0.0.0-20250106190028-bf86bc98b879 | 0.0.0-20250116181547-c4f1e01eab0d |