Mailpit - Server-Side Request Forgery (SSRF)

Overview #

A Server-Side Request Forgery (SSRF) vulnerability exists in Mailpit's /proxy endpoint that allows attackers to make requests to internal network resources.

Vulnerability Details #

Affected Versions: < 1.28.0

Location: /api/v1/proxy endpoint

Affected Parameter: url

Root Cause: The vulnerability exists due to insufficient validation of user-supplied URLs. Attackers can supply internal URLs that the server will fetch on their behalf.

Exploitation Requirements #

  • No authentication required
  • Direct access to the Mailpit web interface

Impact #

Remote attackers can exploit this vulnerability to:

  • Access internal services (databases, APIs)
  • Scan internal network resources
  • Access cloud metadata endpoints (AWS, GCP, Azure)
  • Potentially pivot to internal systems

Proof of Concept #

GET /api/v1/proxy?url=http://169.254.169.254/latest/meta-data/ HTTP/1.1
Host: mailpit.target.com

Solution #

Upgrade to Mailpit version 1.28.1 or later, which includes proper URL validation for the proxy endpoint.

References #