CARVIEW |
Select Language
HTTP/2 200
date: Mon, 28 Jul 2025 20:31:51 GMT
content-type: text/html; charset=utf-8
vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, X-Requested-With,Accept-Encoding, Accept, X-Requested-With
etag: W/"4520c0b0738d51c47070f6feb500fcad"
cache-control: max-age=0, private, must-revalidate
strict-transport-security: max-age=31536000; includeSubdomains; preload
x-frame-options: deny
x-content-type-options: nosniff
x-xss-protection: 0
referrer-policy: no-referrer-when-downgrade
content-security-policy: default-src 'none'; base-uri 'self'; child-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com release-assets.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com copilotprodattachments.blob.core.windows.net/github-production-copilot-attachments/ github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/
server: github.com
content-encoding: gzip
accept-ranges: bytes
set-cookie: _gh_sess=C4oN6cOifV8cU%2FXQjukD1tq%2FTJ3MYqRshwDmAbFerwRh5W6zmKLiHBzYFrt05ZfwTZVaTQAzabo3m%2BmXf7txfdKqtNWUEEZd2zb8VagpN7oqIfwktbOnwO2LdpHpLrZpxFZV3hMLf9gdzv6XaSQEqvWxsvNCROcgrjeP5k%2FW%2FvP2O4ACS6gHt9wtHUDJ8TD80JdZn2G3bxJm2le3saYzNKR0eIR5RJMWpMqmjBAw8sgJ1%2F4CsindqLjgo%2BOyith6FAyi8ITWYVSfawBGOaS71Q%3D%3D--jYMszgKfyw%2BOLPci--8RXwV7BsT90BR2x9juoz3g%3D%3D; Path=/; HttpOnly; Secure; SameSite=Lax
set-cookie: _octo=GH1.1.422529152.1753734710; Path=/; Domain=github.com; Expires=Tue, 28 Jul 2026 20:31:50 GMT; Secure; SameSite=Lax
set-cookie: logged_in=no; Path=/; Domain=github.com; Expires=Tue, 28 Jul 2026 20:31:50 GMT; HttpOnly; Secure; SameSite=Lax
x-github-request-id: DD26:3CFA5:7DEBD:A938E:6887DE36
Improper Domain Lookup that potentially leads to SSRF attacks · Advisory · libuv/libuv · GitHub
Skip to content
Navigation Menu
{{ message }}
-
Notifications
You must be signed in to change notification settings - Fork 3.7k
Improper Domain Lookup that potentially leads to SSRF attacks
High
Package
No package listed
Affected versions
>= v1.24.0
Patched versions
v1.48.0
Description
You can’t perform that action at this time.
Summary
The
uv_getaddrinfo
function insrc/unix/getaddrinfo.c
(and its windows counterpartsrc/win/getaddrinfo.c
), truncates hostnames to 256 characters before callinggetaddrinfo
. This behavior can be exploited to create addresses like0x00007f000001
, which are considered valid bygetaddrinfo
and could allow an attacker to craft payloads that resolve to unintended IP addresses, bypassing developer checks.Details
The vulnerability arises due to how the
hostname_ascii
variable (with a length of 256 bytes) is handled inuv_getaddrinfo
and subsequently inuv__idna_toascii
. When the hostname exceeds 256 characters, it gets truncated without a terminating null byte. Depending on the build and runtime environment, it can lead to different exploitation scenarios:pm2
,kubernetes
, etc).0-9a-f
, which makes 16 possible cases (out of 256) useful for calling localhost (127.0.0.x) and potentially bypassing security measures on internal APIs. The same is true for calling other IP-ranges.PoC
Impact
Access to Internal APIs:
The following code, when deployed in an environment with multiple pods (e.g., Kubernetes), is vulnerable to the attack described above, potentially allowing unauthorized access to internal APIs.
SSRF Attack:
Another scenario involves websites (similar to MySpace) that allows users to have
username.example.com
pages. Internal services that crawl or cache these user pages can be exposed to SSRF attacks if a malicious user chooses a long vulnerable username.