TrueLayer.NET is the .Net client for TrueLayer. The vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure. The issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the `truelayer-dotnet` library. Versions of TrueLayer.Client `v1.6.0` and later are not affected.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0269 TrueLayer.NET is the .Net client for TrueLayer. The vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure. The issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the `truelayer-dotnet` library. Versions of TrueLayer.Client `v1.6.0` and later are not affected.
Github GHSA Github GHSA GHSA-67m4-qxp3-j6hh TrueLayer.Client SSRF when fetching payment or payment provider
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-23T18:22:14.639Z

Reserved: 2024-01-22T22:23:54.342Z

Link: CVE-2024-23838

cve-icon Vulnrichment

Updated: 2024-08-01T23:13:08.132Z

cve-icon NVD

Status : Modified

Published: 2024-01-30T17:15:11.437

Modified: 2024-11-21T08:58:32.093

Link: CVE-2024-23838

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.