CVE-2026-0613

7.5 HIGH

📋 TL;DR

The Librarian contains a server-side request forgery (SSRF) vulnerability that allows attackers to use the web_fetch tool to scan internal network ports and services. This enables reconnaissance of the Hertzner cloud environment where TheLibrarian operates. All users of affected versions are vulnerable to this internal network scanning.

💻 Affected Systems

Products:
  • The Librarian
Versions: All versions before the vendor fix
Operating Systems: iOS, Cloud deployment environments
Default Config Vulnerable: ⚠️ Yes
Notes: Affects The Librarian's cloud deployment on Hertzner infrastructure; iOS app may interact with vulnerable backend.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map the entire internal network, discover sensitive services, and potentially chain with other vulnerabilities to compromise internal systems.

🟠

Likely Case

Attackers perform internal reconnaissance to identify other vulnerable services, databases, or administrative interfaces for further exploitation.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact is limited to scanning only allowed internal services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF exploitation is well-documented and tools exist; the web_fetch functionality makes exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Vendor has fixed in all affected versions

Vendor Advisory: https://thelibrarian.io/

Restart Required: Yes

Instructions:

1. Update to the latest version of The Librarian. 2. Restart the application/service. 3. Verify the fix by testing SSRF attempts.

🔧 Temporary Workarounds

Network egress filtering

linux

Block outbound requests from The Librarian to internal IP ranges

iptables -A OUTPUT -p tcp -d 10.0.0.0/8 -j DROP
iptables -A OUTPUT -p tcp -d 172.16.0.0/12 -j DROP
iptables -A OUTPUT -p tcp -d 192.168.0.0/16 -j DROP

Input validation

all

Implement strict URL validation to reject internal IP addresses

🧯 If You Can't Patch

  • Implement network segmentation to isolate The Librarian from sensitive internal services
  • Deploy web application firewall (WAF) rules to detect and block SSRF patterns

🔍 How to Verify

Check if Vulnerable:

Attempt to make a request to an internal service using the web_fetch functionality (e.g., http://169.254.169.254/)

Check Version:

Check application version in settings or via vendor documentation

Verify Fix Applied:

Test the same SSRF attempts; they should be blocked or return error responses

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound requests to internal IP addresses
  • Multiple failed connection attempts to different internal ports
  • Requests to metadata services (169.254.169.254)

Network Indicators:

  • Port scanning patterns from The Librarian instance
  • Outbound connections to non-standard internal ports

SIEM Query:

source="thelibrarian" AND (dest_ip=10.0.0.0/8 OR dest_ip=172.16.0.0/12 OR dest_ip=192.168.0.0/16 OR dest_ip=169.254.169.254)

🔗 References

📤 Share & Export