// For flags

CVE-2024-32980

Spin contains a potential network sandbox escape for specifically configured Spin applications

Severity Score

9.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Spin is the developer tool for building and running serverless applications powered by WebAssembly. Prior to 2.4.3, some specifically configured Spin applications that use `self` requests without a specified URL authority can be induced to make requests to arbitrary hosts via the `Host` HTTP header. The following conditions need to be met for an application to be vulnerable: 1. The environment Spin is deployed in routes requests to the Spin runtime based on the request URL instead of the `Host` header, and leaves the `Host` header set to its original value; 2. The Spin application's component handling the incoming request is configured with an `allow_outbound_hosts` list containing `"self"`; and 3. In reaction to an incoming request, the component makes an outbound request whose URL doesn't include the hostname/port. Spin 2.4.3 has been released to fix this issue.

Spin es la herramienta de desarrollo para crear y ejecutar aplicaciones sin servidor impulsadas por WebAssembly. Antes de 2.4.3, algunas aplicaciones Spin configuradas específicamente que usan solicitudes "automáticas" sin una autoridad de URL especificada pueden ser inducidas a realizar solicitudes a hosts arbitrarios a través del encabezado HTTP "Host". Se deben cumplir las siguientes condiciones para que una aplicación sea vulnerable: 1. El entorno Spin se implementa en rutas de solicitudes al tiempo de ejecución de Spin según la URL de solicitud en lugar del encabezado "Host", y deja el encabezado "Host" configurado en su valor original; 2. El componente de la aplicación Spin que maneja la solicitud entrante está configurado con una lista `allow_outbound_hosts` que contiene `"self"`; y 3. En reacción a una solicitud entrante, el componente realiza una solicitud saliente cuya URL no incluye el nombre de host/puerto. Se lanzó Spin 2.4.3 para solucionar este problema.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
Poc
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-04-22 CVE Reserved
  • 2024-05-08 CVE Published
  • 2024-05-09 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-610: Externally Controlled Reference to a Resource in Another Sphere
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Fermyon
Search vendor "Fermyon"
Spin
Search vendor "Fermyon" for product "Spin"
< 2.4.3
Search vendor "Fermyon" for product "Spin" and version " < 2.4.3"
en
Affected