Home

Description

Terrascan v1.18.3 and prior are vulnerable to Server-Side Request Forgery (SSRF) via the remote_url parameter in the remote directory scan endpoint (POST /v1/{iac}/{iacVersion}/{cloud}/remote/dir/scan) when running in server mode. An unauthenticated remote attacker can supply an attacker-controlled HTTP URL as remote_url with remote_type set to "http". The URL is passed directly to hashicorp/go-getter (v1.7.5) without validation. Go-getter's HttpGetter supports the X-Terraform-Get response header, allowing the attacker's server to redirect the download to a file:// URL, enabling local file read. Additionally, HttpGetter has Netrc set to true, causing it to read ~/.netrc and send stored credentials to attacker-controlled hostnames. This affects deployments running terrascan in server mode (terrascan server), which binds to 0.0.0.0 with no authentication. Note: Terrascan was archived in August 2023 and no patch will be released.

PUBLISHED Reserved 2026-05-19 | Published 2026-05-19 | Updated 2026-05-19 | Assigner tenable




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

Server-Side Request Forgery (SSRF)

Externally Controlled Reference to a Resource in Another Sphere

External Control of File Name or Path

Product status

Default status
affected

Any version
affected

Credits

Tristan Madani (@TristanInSec) from Talence Security finder

References

github.com/tenable/terrascan (Terrascan GitHub Repository)

cve.org (CVE-2026-47357)

nvd.nist.gov (CVE-2026-47357)

Download JSON