Home

Description

Terrascan v1.18.3 and prior are vulnerable to Server-Side Request Forgery (SSRF) via external URL resolution in uploaded IaC templates when running in server mode. When Terrascan parses uploaded ARM templates or CloudFormation templates, it resolves external URLs referenced within those templates via hashicorp/go-getter with all default detectors enabled, including FileDetector. An unauthenticated remote attacker can upload an ARM template containing a templateLink.uri or parametersLink.uri field, or a CloudFormation template containing an AWS::CloudFormation::Stack TemplateURL field, pointing to an attacker-controlled URL. Terrascan will fetch the attacker-controlled URL server-side. Unlike SSRF via the remote scan endpoint, file:// URLs are directly usable without requiring an X-Terraform-Get redirect, enabling local file read. This affects deployments running terrascan in server mode (terrascan server), which binds to 0.0.0.0 with no authentication. Note: Terrascan was archived in August 2023 and no patch will be released.

PUBLISHED Reserved 2026-05-19 | Published 2026-05-19 | Updated 2026-05-19 | Assigner tenable




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

Server-Side Request Forgery (SSRF)

Externally Controlled Reference to a Resource in Another Sphere

External Control of File Name or Path

Product status

Default status
affected

Any version
affected

Credits

Tristan Madani (@TristanInSec) from Talence Security finder

References

github.com/tenable/terrascan (Terrascan GitHub Repository)

cve.org (CVE-2026-47358)

nvd.nist.gov (CVE-2026-47358)

Download JSON