Miggo Logo

CVE-2025-27090:
SSRF in sliver teamserver

6.9

CVSS Score
4.0

Basic Information

EPSS Score
0.37074%
Published
2/19/2025
Updated
2/20/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/bishopfox/slivergo>= 1.5.26, <= 1.5.421.5.43

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the combination of these two functions:

  1. tunnelDataHandler accepts TunnelData messages with CreateReverse=true without operator authorization check
  2. createReverseTunnelHandler then uses attacker-controlled Host/Port values to establish connections

The patch adds session validation through rtunnels.Check() in createReverseTunnelHandler and tracking via rtunnels.AddPending in RPC handlers, confirming these were the missing security checks. The reproduction POC specifically targets this flow by sending malicious TunnelData messages to trigger unauthorized reverse tunnels.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T** r*v*rs* port *orw*r*in* in sliv*r t**ms*rv*r *llows t** impl*nt to op*n * r*v*rs* tunn*l on t** sliv*r t**ms*rv*r wit*out v*ri*yin* i* t** op*r*tor instru*t** t** impl*nt to *o so ### R*pro*u*tion st*ps Run s*rv*r ``` w**t *ttps://*

Reasoning

T** vuln*r**ility st*ms *rom t** *om*in*tion o* t**s* two *un*tions: *. tunn*l**t***n*l*r ****pts Tunn*l**t* m*ss***s wit* *r**t*R*v*rs*=tru* wit*out op*r*tor *ut*oriz*tion ****k *. *r**t*R*v*rs*Tunn*l**n*l*r t**n us*s *tt**k*r-*ontroll** *ost/Port v