CVE-2026-42864 PUBLISHED

FireFighter: Unauthenticated SSRF in Raid jira_bot endpoint allows IAM credential theft

Assigner: GitHub_M
Reserved: 30.04.2026 Published: 11.05.2026 Updated: 11.05.2026

FireFighter is an incident management application. Prior to 0.0.54, the POST /api/v2/firefighter/raid/jira_bot endpoint (CreateJiraBotView) is reachable without authentication (permission_classes = [permissions.AllowAny]). Its attachments payload is fetched server-side via httpx.get() with no URL validation, then uploaded as an attachment on the Jira ticket that gets created. An unauthenticated caller able to reach the ingress can coerce the pod into fetching arbitrary URLs and exfiltrate the response as a Jira attachment. On EC2/EKS deployments that do not enforce IMDSv2, this allows theft of the temporary AWS credentials attached to the pod's IAM role. The docstring on the view claims a Bearer token is required, but the code does not enforce it. This vulnerability is fixed in 0.0.54.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
CVSS Score: 9.9

Product Status

Vendor ManoManoTech
Product firefighter-incident
Versions
  • Version < 0.0.54 is affected

References

Problem Types

  • CWE-306: Missing Authentication for Critical Function CWE
  • CWE-918: Server-Side Request Forgery (SSRF) CWE