// For flags

CVE-2024-32980

Spin contains a potential network sandbox escape for specifically configured Spin applications

Severity Score

9.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Spin is the developer tool for building and running serverless applications powered by WebAssembly. Prior to 2.4.3, some specifically configured Spin applications that use `self` requests without a specified URL authority can be induced to make requests to arbitrary hosts via the `Host` HTTP header. The following conditions need to be met for an application to be vulnerable: 1. The environment Spin is deployed in routes requests to the Spin runtime based on the request URL instead of the `Host` header, and leaves the `Host` header set to its original value; 2. The Spin application's component handling the incoming request is configured with an `allow_outbound_hosts` list containing `"self"`; and 3. In reaction to an incoming request, the component makes an outbound request whose URL doesn't include the hostname/port. Spin 2.4.3 has been released to fix this issue.

Spin es la herramienta de desarrollo para crear y ejecutar aplicaciones sin servidor impulsadas por WebAssembly. Antes de 2.4.3, algunas aplicaciones Spin configuradas específicamente que usan solicitudes "automáticas" sin una autoridad de URL especificada pueden ser inducidas a realizar solicitudes a hosts arbitrarios a través del encabezado HTTP "Host". Se deben cumplir las siguientes condiciones para que una aplicación sea vulnerable: 1. El entorno Spin se implementa en rutas de solicitudes al tiempo de ejecución de Spin según la URL de solicitud en lugar del encabezado "Host", y deja el encabezado "Host" configurado en su valor original; 2. El componente de la aplicación Spin que maneja la solicitud entrante está configurado con una lista `allow_outbound_hosts` que contiene `"self"`; y 3. En reacción a una solicitud entrante, el componente realiza una solicitud saliente cuya URL no incluye el nombre de host/puerto. Se lanzó Spin 2.4.3 para solucionar este problema.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
Poc
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-04-22 CVE Reserved
  • 2024-05-08 CVE Published
  • 2024-08-02 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-610: Externally Controlled Reference to a Resource in Another Sphere
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Fermyon
Search vendor "Fermyon"
Spin
Search vendor "Fermyon" for product "Spin"
< 2.4.3
Search vendor "Fermyon" for product "Spin" and version " < 2.4.3"
en
Affected