TrueLayer.NET is the .Net client for TrueLayer. The vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure. The issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the `truelayer-dotnet` library. Versions of TrueLayer.Client `v1.6.0` and later are not affected.
References
Configurations
History
21 Nov 2024, 08:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/TrueLayer/truelayer-dotnet/commit/75e436ed5360faa73d6e7ce3a9903a3c49505e3e - Patch | |
References | () https://github.com/TrueLayer/truelayer-dotnet/security/advisories/GHSA-67m4-qxp3-j6hh - Vendor Advisory |
08 Feb 2024, 18:02
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://github.com/TrueLayer/truelayer-dotnet/security/advisories/GHSA-67m4-qxp3-j6hh - Vendor Advisory | |
References | () https://github.com/TrueLayer/truelayer-dotnet/commit/75e436ed5360faa73d6e7ce3a9903a3c49505e3e - Patch | |
First Time |
Truelayer
Truelayer truelayer.net |
|
CPE | cpe:2.3:a:truelayer:truelayer.net:*:*:*:*:*:*:*:* |
30 Jan 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-30 17:15
Updated : 2024-11-21 08:58
NVD link : CVE-2024-23838
Mitre link : CVE-2024-23838
CVE.ORG link : CVE-2024-23838
JSON object : View
Products Affected
truelayer
- truelayer.net
CWE
CWE-918
Server-Side Request Forgery (SSRF)