OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1.
Metrics
Affected Vendors & Products
References
History
Wed, 05 Mar 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openziti
Openziti openziti |
|
CPEs | cpe:2.3:a:openziti:openziti:*:*:*:*:*:*:*:* | |
Vendors & Products |
Openziti
Openziti openziti |
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 03 Mar 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1. | |
Title | Server Side Request Forgery in Ziti Console | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-03T18:33:19.670Z
Updated: 2025-03-03T19:10:02.275Z
Reserved: 2025-02-26T18:11:52.304Z
Link: CVE-2025-27501

Updated: 2025-03-03T19:09:16.168Z

Status : Analyzed
Published: 2025-03-03T19:15:36.300
Modified: 2025-03-05T20:16:46.363
Link: CVE-2025-27501

No data.