Skip to content

Commit 92f2c5b

Browse files
1 parent 9e8f948 commit 92f2c5b

2 files changed

Lines changed: 119 additions & 0 deletions

File tree

Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-c83f-3xp6-hfcp",
4+
"modified": "2026-03-25T22:00:13Z",
5+
"published": "2026-03-25T22:00:13Z",
6+
"aliases": [
7+
"CVE-2026-33182"
8+
],
9+
"summary": "Saloon is vulnerable to SSRF and credential leakage via absolute URL in endpoint overriding base URL",
10+
"details": "### Impact\nUsers providing user generated input into the `resolveEndpoint` method on requests.\n\n### Patches\nUpgrade to Saloon v4+\n\nUpgrade guide: https://docs.saloon.dev/upgrade/upgrading-from-v3-to-v4\n\n### Description\nWhen building the request URL, Saloon combined the connector's base URL with the request endpoint. If the endpoint was a valid absolute URL (e.g. https://attacker.example.com/callback), the code used that URL as-is and ignored the base URL. The request—and any authentication headers, cookies, or tokens attached by the connector—was then sent to the attacker-controlled host. If the endpoint could be influenced by user input or configuration (e.g. redirect_uri, callback URL), this allowed server-side request forgery (SSRF) and/or credential leakage to a third-party host. The fix (in the next major version) is to reject absolute URLs in the endpoint: URLHelper::join() throws InvalidArgumentException when the endpoint is a valid absolute URL, unless explicitly allowed, requiring callers to opt-in to the functionality on a per-connector or per-request basis.\n\n### Credits\nSaloon thanks @HuajiHD for finding the issue and recommending solutions and @JonPurvis for applying the fix.",
11+
"severity": [],
12+
"affected": [
13+
{
14+
"package": {
15+
"ecosystem": "Packagist",
16+
"name": "saloonphp/saloon"
17+
},
18+
"ranges": [
19+
{
20+
"type": "ECOSYSTEM",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "4.0.0"
27+
}
28+
]
29+
}
30+
]
31+
}
32+
],
33+
"references": [
34+
{
35+
"type": "WEB",
36+
"url": "https://github.com/saloonphp/saloon/security/advisories/GHSA-c83f-3xp6-hfcp"
37+
},
38+
{
39+
"type": "WEB",
40+
"url": "https://docs.saloon.dev/upgrade/upgrading-from-v3-to-v4"
41+
},
42+
{
43+
"type": "PACKAGE",
44+
"url": "https://github.com/saloonphp/saloon"
45+
}
46+
],
47+
"database_specific": {
48+
"cwe_ids": [
49+
"CWE-522",
50+
"CWE-918"
51+
],
52+
"severity": "MODERATE",
53+
"github_reviewed": true,
54+
"github_reviewed_at": "2026-03-25T22:00:13Z",
55+
"nvd_published_at": null
56+
}
57+
}
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-f7xc-5852-fj99",
4+
"modified": "2026-03-25T22:00:43Z",
5+
"published": "2026-03-25T22:00:43Z",
6+
"aliases": [
7+
"CVE-2026-33183"
8+
],
9+
"summary": "Saloon has a Fixture Name Path Traversal Vulnerability",
10+
"details": "### Impact\nUsers with MockResponse fixtures that use path traversal.\n\n### Patches\nUpgrade to Saloon v4+\n\nUpgrade guide: https://docs.saloon.dev/upgrade/upgrading-from-v3-to-v4\n\n### Description\nFixture names were used to build file paths under the configured fixture directory without validation. A name containing path segments (e.g. ../traversal or ../../etc/passwd) resulted in a path outside that directory. When the application read a fixture (e.g. for mocking) or wrote one (e.g. when recording responses), it could read or write files anywhere the process had access. If the fixture name was derived from user or attacker-controlled input (e.g. request parameters or config), this constituted a path traversal vulnerability and could lead to disclosure of sensitive files or overwriting of critical files. The fix adds validation in the fixture layer (rejecting names with /, \\, .., or null bytes, and restricting to a safe character set) and defence-in-depth in the storage layer (ensuring the resolved path remains under the base directory before any read or write).\n\n### Credits\nSaloon thanks @HuajiHD for finding the issue and recommending solutions and @JonPurvis for applying the fix.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "saloonphp/saloon"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "4.0.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/saloonphp/saloon/security/advisories/GHSA-f7xc-5852-fj99"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://docs.saloon.dev/upgrade/upgrading-from-v3-to-v4"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/saloonphp/saloon"
50+
}
51+
],
52+
"database_specific": {
53+
"cwe_ids": [
54+
"CWE-125",
55+
"CWE-787"
56+
],
57+
"severity": "MODERATE",
58+
"github_reviewed": true,
59+
"github_reviewed_at": "2026-03-25T22:00:43Z",
60+
"nvd_published_at": null
61+
}
62+
}

0 commit comments

Comments
 (0)