@fedify/fedify 1.3.3 → 1.3.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGES.md CHANGED
@@ -3,6 +3,29 @@
3
3
  Fedify changelog
4
4
  ================
5
5
 
6
+ Version 1.3.4
7
+ -------------
8
+
9
+ Released on January 21, 2025.
10
+
11
+ - Fixed several security vulnerabilities of the `lookupWebFinger()` function.
12
+ [[CVE-2025-23221]]
13
+
14
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
15
+ had followed the infinite number of redirects, which could lead to
16
+ a denial of service attack. Now it follows up to 5 redirects.
17
+
18
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
19
+ had followed the redirects to other than the HTTP/HTTPS schemes, which
20
+ could lead to a security breach. Now it follows only the same scheme
21
+ as the original request.
22
+
23
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
24
+ had followed the redirects to the private network addresses, which
25
+ could lead to a SSRF attack. Now it follows only the public network
26
+ addresses.
27
+
28
+
6
29
  Version 1.3.3
7
30
  -------------
8
31
 
@@ -147,6 +170,29 @@ Released on November 30, 2024.
147
170
  [#193]: https://github.com/dahlia/fedify/issues/193
148
171
 
149
172
 
173
+ Version 1.2.11
174
+ --------------
175
+
176
+ Released on January 21, 2025.
177
+
178
+ - Fixed several security vulnerabilities of the `lookupWebFinger()` function.
179
+ [[CVE-2025-23221]]
180
+
181
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
182
+ had followed the infinite number of redirects, which could lead to
183
+ a denial of service attack. Now it follows up to 5 redirects.
184
+
185
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
186
+ had followed the redirects to other than the HTTP/HTTPS schemes, which
187
+ could lead to a security breach. Now it follows only the same scheme
188
+ as the original request.
189
+
190
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
191
+ had followed the redirects to the private network addresses, which
192
+ could lead to a SSRF attack. Now it follows only the public network
193
+ addresses.
194
+
195
+
150
196
  Version 1.2.10
151
197
  --------------
152
198
 
@@ -371,6 +417,29 @@ Released on October 31, 2024.
371
417
  [#118]: https://github.com/dahlia/fedify/issues/118
372
418
 
373
419
 
420
+ Version 1.1.11
421
+ --------------
422
+
423
+ Released on January 21, 2025.
424
+
425
+ - Fixed several security vulnerabilities of the `lookupWebFinger()` function.
426
+ [[CVE-2025-23221]]
427
+
428
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
429
+ had followed the infinite number of redirects, which could lead to
430
+ a denial of service attack. Now it follows up to 5 redirects.
431
+
432
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
433
+ had followed the redirects to other than the HTTP/HTTPS schemes, which
434
+ could lead to a security breach. Now it follows only the same scheme
435
+ as the original request.
436
+
437
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
438
+ had followed the redirects to the private network addresses, which
439
+ could lead to a SSRF attack. Now it follows only the public network
440
+ addresses.
441
+
442
+
374
443
  Version 1.1.10
375
444
  --------------
376
445
 
@@ -636,6 +705,31 @@ Released on October 20, 2024.
636
705
  [#150]: https://github.com/dahlia/fedify/issues/150
637
706
 
638
707
 
708
+ Version 1.0.14
709
+ --------------
710
+
711
+ Released on January 21, 2025.
712
+
713
+ - Fixed several security vulnerabilities of the `lookupWebFinger()` function.
714
+ [[CVE-2025-23221]]
715
+
716
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
717
+ had followed the infinite number of redirects, which could lead to
718
+ a denial of service attack. Now it follows up to 5 redirects.
719
+
720
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
721
+ had followed the redirects to other than the HTTP/HTTPS schemes, which
722
+ could lead to a security breach. Now it follows only the same scheme
723
+ as the original request.
724
+
725
+ - Fixed a security vulnerability where the `lookupWebFinger()` function
726
+ had followed the redirects to the private network addresses, which
727
+ could lead to a SSRF attack. Now it follows only the public network
728
+ addresses.
729
+
730
+ [CVE-2025-23221]: https://github.com/dahlia/fedify/security/advisories/GHSA-c59p-wq67-24wx
731
+
732
+
639
733
  Version 1.0.13
640
734
  --------------
641
735
 
package/LICENSE CHANGED
@@ -1,6 +1,6 @@
1
1
  MIT License
2
2
 
3
- Copyright 2024 Hong Minhee
3
+ Copyright 2024–2025 Hong Minhee
4
4
 
5
5
  Permission is hereby granted, free of charge, to any person obtaining a copy of
6
6
  this software and associated documentation files (the "Software"), to deal in
package/esm/deno.js CHANGED
@@ -1,6 +1,6 @@
1
1
  export default {
2
2
  "name": "@fedify/fedify",
3
- "version": "1.3.3",
3
+ "version": "1.3.4",
4
4
  "license": "MIT",
5
5
  "exports": {
6
6
  ".": "./mod.ts",
@@ -38,7 +38,13 @@ export async function validatePublicUrl(url) {
38
38
  }
39
39
  // To prevent SSRF via DNS rebinding, we need to resolve all IP addresses
40
40
  // and ensure that they are all public:
41
- const addresses = await lookup(hostname, { all: true });
41
+ let addresses;
42
+ try {
43
+ addresses = await lookup(hostname, { all: true });
44
+ }
45
+ catch {
46
+ addresses = [];
47
+ }
42
48
  for (const { address, family } of addresses) {
43
49
  if (family === 4 && !isValidPublicIPv4Address(address) ||
44
50
  family === 6 && !isValidPublicIPv6Address(address) ||