Octo STS, Unauthenticated SSRF, CVE-2025-12345 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-12345 exploits improper input validation in Octo-STS’s OpenID Connect token processing. Attackers craft malicious tokens with manipulated fields (e.g., `redirect_uri` or `aud` claims) to force the server to make internal HTTP requests. These requests can access restricted endpoints, leak error logs, or interact with internal services. The vulnerability occurs due to insufficient sanitization of user-supplied URIs in token claims, allowing Server-Side Request Forgery (SSRF) without authentication.

DailyCVE Form

Platform: Octo-STS
Version: < v0.5.3
Vulnerability: SSRF via OIDC tokens
Severity: Critical
Date: 2025-06-26

Prediction: Patch by 2025-07-10

What Undercode Say

curl -X POST https://octo-sts/api/token -d '{"redirect_uri":"http://internal-service/admin"}'
malicious_token = {
"aud": "http://169.254.169.254",
"redirect_uri": "file:///etc/passwd"
}

How Exploit

1. Craft OIDC token with malicious `redirect_uri`.

2. Send token to Octo-STS endpoint.

3. Server fetches internal resources, leaks data.

Protection from this CVE

1. Upgrade to v0.5.3.

2. Disable internal URI schemes.

3. Enable OIDC claim validation.

Impact

1. Internal network exposure.

2. Sensitive data leakage.

3. Privilege escalation risk.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top