Description
Cowrie versions prior to 2.9.0 contain a server-side request forgery (SSRF) vulnerability in the emulated shell implementation of wget and curl. In the default emulated shell configuration, these command emulations perform real outbound HTTP requests to attacker-supplied destinations. Because no outbound request rate limiting was enforced, unauthenticated remote attackers could repeatedly invoke these commands to generate unbounded HTTP traffic toward arbitrary third-party targets, allowing the Cowrie honeypot to be abused as a denial-of-service amplification node and masking the attacker’s true source address behind the honeypot’s IP.
Problem types
CWE-918 Server-Side Request Forgery (SSRF)
Product status
Any version before 2.9.0
Credits
Abraham Gebrehiwot and Filippo Lauria (Institute of Informatics and Telematics, Italian National Research Council (CNR))
Michele Castellaneta, Claudio Porta, and Sara Afzal (Institute of Informatics and Telematics, Italian National Research Council (CNR))
References
github.com/advisories/GHSA-83jg-m2pm-4jxj
github.com/advisories/GHSA-83jg-m2pm-4jxj
github.com/cowrie/cowrie/releases/tag/v2.9.0
github.com/cowrie/cowrie/pull/2800
github.com/cowrie/cowrie/issues/2622
www.vulncheck.com/...n-enables-ssrf-based-ddos-amplification