Skip to main content

CVE-2022-29188: CWE-918: Server-Side Request Forgery (SSRF) in stripe smokescreen

Medium
Published: Fri May 20 2022 (05/20/2022, 23:50:10 UTC)
Source: CVE
Vendor/Project: stripe
Product: smokescreen

Description

Smokescreen is an HTTP proxy. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by surrounding the hostname with square brackets (e.g. `[example.com]`). This only impacted the HTTP proxy functionality of Smokescreen. HTTPS requests were not impacted. Smokescreen version 0.0.4 contains a patch for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 08:22:17 UTC

Technical Analysis

CVE-2022-29188 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Stripe Smokescreen HTTP proxy, specifically affecting versions prior to 0.0.4. Smokescreen is designed to mitigate SSRF attacks by acting as a proxy that restricts outbound HTTP requests from applications, preventing attackers from leveraging application behavior to access or scan internal infrastructure. It includes a deny list feature to block access to unauthorized external URLs. The vulnerability arises from an input validation flaw where the deny list filtering can be bypassed by enclosing a hostname in square brackets (e.g., [example.com]). This bypass allows malicious actors to circumvent the deny list and make unauthorized HTTP requests through the proxy. Notably, this issue only impacts HTTP proxy functionality; HTTPS requests remain unaffected. The flaw was patched in Smokescreen version 0.0.4. No known exploits have been reported in the wild to date. The vulnerability is classified under CWE-918, which covers SSRF issues where an attacker can induce the server to make unintended requests. The flaw could enable attackers to reach internal or restricted network resources, potentially exposing sensitive data or enabling further attacks within the internal network. However, exploitation requires the application to use the vulnerable Smokescreen HTTP proxy and to process attacker-controlled URLs. Since HTTPS proxying is not affected, the attack surface is somewhat limited. The vulnerability does not require authentication or user interaction beyond supplying crafted URLs to the application using Smokescreen. Overall, this vulnerability represents a medium-severity SSRF risk due to its potential to bypass access controls and reach internal systems, but with limited scope and no known active exploitation.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the adoption of the Stripe Smokescreen HTTP proxy in their infrastructure. Organizations using Smokescreen versions prior to 0.0.4 for HTTP proxying are at risk of SSRF attacks that could allow attackers to access internal network resources, potentially leading to unauthorized data access, internal reconnaissance, or pivoting to other systems. This could compromise confidentiality and integrity of sensitive data, especially in sectors with critical internal services such as finance, healthcare, and government. The vulnerability does not affect HTTPS proxying, which limits the attack vector. However, if internal applications rely on HTTP proxying through Smokescreen and enforce deny lists for security, this bypass could undermine those protections. Given the medium severity and lack of known exploits, the immediate risk is moderate, but organizations with sensitive internal networks should prioritize remediation to prevent potential exploitation. The impact is heightened in environments where internal network segmentation and access controls rely heavily on Smokescreen's deny list enforcement. Additionally, organizations that expose internal services indirectly via applications using Smokescreen could see increased risk of lateral movement or data leakage if exploited.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify all instances of Stripe Smokescreen in their environment, focusing on versions prior to 0.0.4 used for HTTP proxying. 2) Immediately upgrade Smokescreen to version 0.0.4 or later to apply the patch that fixes the deny list bypass vulnerability. 3) Review and audit deny list configurations to ensure they are correctly enforced and consider additional validation or normalization of hostnames to prevent similar bypass techniques. 4) Where possible, prefer HTTPS proxying over HTTP proxying, as HTTPS requests are not affected by this vulnerability. 5) Implement network-level segmentation and firewall rules to restrict outbound HTTP requests from application servers, reducing reliance on application-layer proxies alone. 6) Monitor application logs and network traffic for unusual or unexpected outbound HTTP requests that could indicate attempts to exploit SSRF. 7) Conduct security testing and code reviews on applications utilizing Smokescreen to ensure no other SSRF vectors exist. 8) Educate development and security teams about SSRF risks and the importance of input validation and proxy configuration. These steps go beyond generic advice by focusing on the specific proxy version, configuration auditing, and network controls tailored to the Smokescreen context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-04-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2f7b

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 8:22:17 AM

Last updated: 8/16/2025, 2:48:42 AM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats