fix(security): mitigate blind SSRF in operation delegation (CWE-918) #1001
Merged
aaronzi merged 6 commits intoeclipse-basyx:mainfrom Apr 23, 2026
Merged
fix(security): mitigate blind SSRF in operation delegation (CWE-918) #1001aaronzi merged 6 commits intoeclipse-basyx:mainfrom
aaronzi merged 6 commits intoeclipse-basyx:mainfrom
Conversation
Add strict delegation target validation with secure defaults and explicit allowlist support. Block local/private/link-local/metadata destinations, reject redirects, and extend tests/docs including example config updates.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This pull request introduces a comprehensive security layer for outbound operation delegation in the Submodel Repository feature. The main changes include validating all outbound delegation URIs, blocking potentially unsafe targets by default, supporting allowlists for approved exceptions, and improving error handling and configuration. These changes significantly enhance the safety and configurability of operation delegation.
Security enhancements for operation delegation
OperationDelegationTargetValidatorclass to validate outbound delegation targets, blocking loopback, private, link-local, and metadata addresses, and only allowinghttp/httpsschemes by default. Explicit allowlists for hosts, CIDRs, and ports are supported.OperationDelegationSecurityPropertiesto expose all relevant security configuration options, including toggles for each blocking rule and allowlist settings.OperationDelegationSubmodelRepositoryConfiguration) to wire in the validator and properties, and to enforce validation on every outbound HTTP request.Runtime and error handling improvements
HTTPOperationDelegationto reject HTTP redirects, improve error messages, and ensure all exceptions are wrapped asOperationDelegationException.Readme.md) to describe the new security defaults, configuration options, and allowlist usage for hybrid deployments.