Skip to main content

CVE-2025-52477: CWE-918: Server-Side Request Forgery (SSRF) in octo-sts app

High
VulnerabilityCVE-2025-52477cvecve-2025-52477cwe-918
Published: Thu Jun 26 2025 (06/26/2025, 16:46:09 UTC)
Source: CVE Database V5
Vendor/Project: octo-sts
Product: app

Description

Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging.

AI-Powered Analysis

AILast updated: 06/27/2025, 13:44:14 UTC

Technical Analysis

CVE-2025-52477 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting the octo-sts GitHub App, versions prior to 0.5.3. Octo-STS functions as a Security Token Service (STS) for the GitHub API, facilitating token-based authentication and authorization. The vulnerability arises from improper input sanitization of fields within OpenID Connect tokens, which can be manipulated by unauthenticated attackers. By crafting malicious tokens, attackers can induce the application to make unauthorized internal network requests. These requests may trigger error logs that inadvertently expose sensitive internal information, such as internal IP addresses, service endpoints, or other confidential data. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The vendor addressed this issue in version 0.5.3 by implementing input sanitization and redacting sensitive information from logs, thereby preventing exploitation and information leakage. The CVSS v3.1 base score is 8.6, reflecting a high severity due to the vulnerability's network attack vector, lack of required privileges or user interaction, and the potential for significant confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation warrant prompt remediation.

Potential Impact

For European organizations using octo-sts as part of their GitHub API integration or security infrastructure, this vulnerability poses a significant risk to confidentiality. Exploitation could allow attackers to probe internal networks, potentially revealing sensitive infrastructure details or internal services that could be leveraged for further attacks. This is particularly critical for organizations with complex internal networks or those handling sensitive intellectual property or personal data under GDPR regulations. While the vulnerability does not directly compromise data integrity or availability, the exposure of internal network details can facilitate lateral movement or targeted attacks, increasing overall organizational risk. Additionally, the unauthenticated nature of the exploit means that external attackers can attempt exploitation without prior access, raising the threat level for organizations with publicly accessible octo-sts deployments.

Mitigation Recommendations

European organizations should immediately upgrade octo-sts to version 0.5.3 or later to apply the official patch that sanitizes input and redacts sensitive logging information. Beyond patching, organizations should implement strict network segmentation and firewall rules to limit the octo-sts app's ability to make arbitrary internal network requests. Monitoring and alerting on unusual outbound requests from the octo-sts service can help detect exploitation attempts. Additionally, review and harden logging configurations to ensure sensitive information is not recorded or is properly redacted. Employing Web Application Firewalls (WAFs) with SSRF detection capabilities can provide an additional layer of defense. Finally, conduct regular security assessments and penetration tests focusing on SSRF vectors within internal applications to proactively identify similar weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-17T02:28:39.717Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685e9caaf6cf9081996a6c75

Added to database: 6/27/2025, 1:29:14 PM

Last enriched: 6/27/2025, 1:44:14 PM

Last updated: 8/1/2025, 4:05:41 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats