平台
docker
组件
docker
修复版本
2.0.1
2.0.1
CVE-2026-30953 describes a server-side request forgery (SSRF) vulnerability in LinkAce, a self-hosted archive for collecting website links. This flaw allows attackers to initiate requests to internal network addresses, potentially exposing sensitive data or gaining unauthorized access. The vulnerability affects versions of LinkAce up to and including 2.0.0. A fix is pending, and mitigation strategies are outlined below.
The SSRF vulnerability in LinkAce arises from insufficient validation during link creation via POST requests to /links. Specifically, the server fetches HTML metadata from the provided URL without properly enforcing restrictions on internal network addresses. An attacker can leverage this to send requests to internal services, Docker service hostnames, or cloud metadata endpoints (e.g., AWS EC2 instance metadata). This could lead to the exposure of sensitive information such as internal IP addresses, API keys, or database credentials. Successful exploitation could enable lateral movement within the network or compromise the underlying infrastructure. The lack of consistent application of the NoPrivateIpRule class significantly expands the attack surface.
This vulnerability was publicly disclosed on 2026-03-10. There is no indication of active exploitation campaigns at this time. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept code is not yet available, but the SSRF nature of the vulnerability makes it likely that a PoC will be developed. The ease of exploitation, given the readily available code and the common use of Docker in LinkAce deployments, suggests a medium probability of exploitation.
Organizations using LinkAce in Docker containers, particularly those with exposed internal services or cloud metadata endpoints, are at significant risk. Shared hosting environments where LinkAce instances share network resources are also vulnerable. Legacy LinkAce configurations that haven't been regularly updated are especially susceptible.
• docker: Inspect Docker container network configuration for unusual outbound connections.
docker inspect <container_id> | grep -i 'Networks' • linux / server: Monitor outbound network connections from the LinkAce server using ss or lsof.
ss -t -a | grep linkace • generic web: Monitor access and error logs for requests to internal IP addresses or cloud metadata endpoints. Look for patterns like 169.254.169.254 or 127.0.0.1.
grep -i '169.254.169.254' /var/log/nginx/access.logdisclosure
漏洞利用状态
EPSS
0.03% (10% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2026-30953 is to ensure the NoPrivateIpRule is applied consistently across all link creation paths within LinkAce. Currently, it's only applied in FetchController.php. Administrators should review the codebase and implement this rule in LinkRepository::create() as well. As a temporary workaround, consider restricting network access to the LinkAce server using a Web Application Firewall (WAF) or proxy to block outbound requests to internal IP ranges. Monitor LinkAce logs for unusual outbound requests that might indicate exploitation attempts. Once a patched version of LinkAce is released, upgrade immediately. After upgrade, confirm by attempting to create a link to a known internal resource (e.g., a local web server) and verifying that the request is blocked.
Actualice LinkAce a una versión posterior a la 2.0.0 donde se haya aplicado la regla NoPrivateIpRule a la creación de enlaces. Esto evitará las solicitudes del lado del servidor a direcciones IP privadas.
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2026-30953 is a server-side request forgery vulnerability affecting LinkAce versions up to 2.0.0, allowing attackers to access internal resources.
If you are running LinkAce version 2.0.0 or earlier, you are potentially affected by this SSRF vulnerability.
The recommended fix is to upgrade to a patched version of LinkAce when available. Until then, implement the NoPrivateIpRule in all link creation paths and consider WAF restrictions.
There is currently no evidence of active exploitation, but the vulnerability's nature suggests a potential for future attacks.
Refer to the LinkAce project's official website and security advisories for updates and the latest information regarding CVE-2026-30953.
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。
上传你的 Dockerfile 文件,立即知道是否受影响。