Miggo Logo

CVE-2025-25194: Server-Side Request Forgery (SSRF) in activitypub_federation

4

CVSS Score
3.1

Basic Information

EPSS Score
0.18009%
Published
2/10/2025
Updated
2/11/2025
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
activitypub_federationrust<= 0.6.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key points: 1) verify_url_valid's inadequate domain validation that only does simple string matching without DNS resolution or IP checks, allowing bypasses via DNS tricks and FQDNs. 2) webfinger_resolve_actor's unsafe URL construction using raw user input, enabling path/port manipulation through URL fragment characters. Together they create an SSRF chain where user input bypasses security checks and reaches internal endpoints. Both functions are explicitly referenced in the vulnerability details and PoC, with clear code examples demonstrating their flawed logic.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T*is vuln*r**ility *llows * us*r to *yp*ss *ny pr****in** **r**o*** URL p*t* or s**urity *nti-Lo**l*ost m****nism *n* p*r*orm *n *r*itr*ry **T r*qu*st to *ny *ost, Port *n* URL usin* * W***in**r R*qu*st. ### **t*ils T** W***in**r *n*poin

Reasoning

T** vuln*r**ility st*ms *rom two k*y points: *) v*ri*y_url_v*li*'s in***qu*t* *om*in v*li**tion t**t only *o*s simpl* strin* m*t**in* wit*out *NS r*solution or IP ****ks, *llowin* *yp*ss*s vi* *NS tri*ks *n* *Q*Ns. *) w***in**r_r*solv*_**tor's uns***