Impact
An authenticated SSH user can trigger the Soft Serve server to perform HTTP requests to arbitrary URLs by supplying a crafted LFS endpoint during repository import. The vulnerability is a Classic Server Side Request Forgery (CWE-918) which allows the attacker to cause the server to reach internal or private IP addresses, potentially leaking sensitive data or gaining additional network access. The initial request is blind due to malformed LFS responses, but can be chained by an attacker who controls the fake LFS server to ultimately retrieve content from internal services.
Affected Systems
Versions of Soft Serve from 0.6.0 up to (but not including) 0.11.4 are affected. The vulnerability applies to installations of the charmbracelet Soft Serve Git server that accept authenticated SSH sessions and execute the repo import command. Systems running v0.11.4 or later are not vulnerable.
Risk and Exploitability
The flaw carries a CVSS Base score of 9.1, reflecting a high impact to confidentiality and availability when an attacker can coerce the server into accessing private resources. The EPSS score of less than 1% indicates that, as of this analysis, exploitation is unlikely to be widespread and no public exploits are documented, and the vulnerability is not listed in CISA’s KEV catalog. However, because it requires authenticated SSH access, the threat persists in environments where such users are granted elevated privileges with the ability to invoke the import command. The overall risk remains high for organizations that allow users to import repositories without strict controls.
OpenCVE Enrichment
Github GHSA