CVE-2026-30832
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an authenticated user to trick the Git server into making unauthorized HTTP requests to internal services by using a specially crafted URL. An attacker needs access to the server and can exploit this to gain read access to sensitive internal data by manipulating the server's response.
Technical Description
Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted --lfs-endpoint URL. The initial batch request is blind (the response from a metadata endpoint won't parse as valid LFS JSON), but an attacker hosting a fake LFS server can chain this into full read access to internal services by returning download URLs that point at internal targets. This issue has been patched in version 0.11.4.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:LExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 7, 2026
about 1 month ago
Last Modified
Mar 11, 2026
27 days ago
Vendor
charm
Product
soft serve