[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-47358":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-19T22:43:29.387Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":289,"aliases":290,"duplicate_of":9,"upstream":291,"downstream":292,"duplicates":293,"related":294,"reserved_at":9,"published_at":295,"modified_at":296,"state":297,"summary":298,"references_raw":305,"kevs":311,"epss":9,"epss_history":312,"metrics":313,"affected":327},"CVE-2026-47358","Terrascan v1.18.3 and prior are vulnerable to Server-Side Request Forgery (SSRF) via external URL resolution in uploaded IaC templates when running in server mode. When Terrascan parses uploaded ARM templates or CloudFormation templates, it resolves external URLs referenced within those templates via hashicorp/go-getter with all default detectors enabled, including FileDetector. An unauthenticated remote attacker can upload an ARM template containing a templateLink.uri or parametersLink.uri field, or a CloudFormation template containing an AWS::CloudFormation::Stack TemplateURL field, pointing to an attacker-controlled URL. Terrascan will fetch the attacker-controlled URL server-side. Unlike SSRF via the remote scan endpoint, file:// URLs are directly usable without requiring an X-Terraform-Get redirect, enabling local file read. This affects deployments running terrascan in server mode (terrascan server), which binds to 0.0.0.0 with no authentication. Note: Terrascan was archived in August 2023 and no patch will be released.",null,[11,269,279],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-73","External Control of File Name or Path","The product allows user input to control or influence paths or file names that are used in filesystem operations.","weakness","Draft","Base","High",[20,204,245,249,253,257,261,265],{"id":21,"name":22,"techniques":23},"CAPEC-13","Subverting Environment Variable Values",[24,122,164],{"id":25,"name":26,"tactics":27,"countermeasures":34},"T1562.003","Impair Command History Logging",[28,31],{"id":29,"name":30},"TA0030","Defense Evasion",{"id":32,"name":33},"TA0005","Stealth",[35,40,45,49,53,57,62,66,71,76,80,84,89,93,98,102,106,110,114,118],{"id":36,"name":37,"tactic":38},"D3-CI","Configuration Inventory",{"name":39},"Model",{"id":41,"name":42,"tactic":43},"D3-FA","File Analysis",{"name":44},"Detect",{"id":46,"name":47,"tactic":48},"D3-FIM","File Integrity Monitoring",{"name":44},{"id":50,"name":51,"tactic":52},"D3-DA","Dynamic Analysis",{"name":44},{"id":54,"name":55,"tactic":56},"D3-EFA","Emulated File Analysis",{"name":44},{"id":58,"name":59,"tactic":60},"D3-FEV","File Eviction",{"name":61},"Evict",{"id":63,"name":64,"tactic":65},"D3-RKD","Registry Key Deletion",{"name":61},{"id":67,"name":68,"tactic":69},"D3-DF","Decoy File",{"name":70},"Deceive",{"id":72,"name":73,"tactic":74},"D3-DRA","Disable Remote Access",{"name":75},"Harden",{"id":77,"name":78,"tactic":79},"D3-ACH","Application Configuration Hardening",{"name":75},{"id":81,"name":82,"tactic":83},"D3-FE","File Encryption",{"name":75},{"id":85,"name":86,"tactic":87},"D3-RC","Restore Configuration",{"name":88},"Restore",{"id":90,"name":91,"tactic":92},"D3-RF","Restore File",{"name":88},{"id":94,"name":95,"tactic":96},"D3-CQ","Content Quarantine",{"name":97},"Isolate",{"id":99,"name":100,"tactic":101},"D3-CF","Content Filtering",{"name":97},{"id":103,"name":104,"tactic":105},"D3-LFP","Local File Permissions",{"name":97},{"id":107,"name":108,"tactic":109},"D3-RFAM","Remote File Access Mediation",{"name":97},{"id":111,"name":112,"tactic":113},"D3-CM","Content Modification",{"name":97},{"id":115,"name":116,"tactic":117},"D3-EAL","Executable Allowlisting",{"name":97},{"id":119,"name":120,"tactic":121},"D3-EDL","Executable Denylisting",{"name":97},{"id":123,"name":124,"tactics":125,"countermeasures":137},"T1574.006","Dynamic Linker Hijacking",[126,129,132,133,134],{"id":127,"name":128},"TA0110","Persistence",{"id":130,"name":131},"TA0111","Privilege Escalation",{"id":29,"name":30},{"id":32,"name":33},{"id":135,"name":136},"TA0104","Execution",[138,142,144,146,148,150,152,154,156,158,160,162],{"id":139,"name":140,"tactic":141},"D3-SFA","System File Analysis",{"name":44},{"id":41,"name":42,"tactic":143},{"name":44},{"id":46,"name":47,"tactic":145},{"name":44},{"id":58,"name":59,"tactic":147},{"name":61},{"id":67,"name":68,"tactic":149},{"name":70},{"id":81,"name":82,"tactic":151},{"name":75},{"id":90,"name":91,"tactic":153},{"name":88},{"id":99,"name":100,"tactic":155},{"name":97},{"id":103,"name":104,"tactic":157},{"name":97},{"id":107,"name":108,"tactic":159},{"name":97},{"id":94,"name":95,"tactic":161},{"name":97},{"id":111,"name":112,"tactic":163},{"name":97},{"id":165,"name":166,"tactics":167,"countermeasures":173},"T1574.007","Path Interception by PATH Environment Variable",[168,169,170,171,172],{"id":127,"name":128},{"id":130,"name":131},{"id":29,"name":30},{"id":32,"name":33},{"id":135,"name":136},[174,176,178,180,182,184,186,188,190,192,194,196,198,200,202],{"id":41,"name":42,"tactic":175},{"name":44},{"id":46,"name":47,"tactic":177},{"name":44},{"id":50,"name":51,"tactic":179},{"name":44},{"id":54,"name":55,"tactic":181},{"name":44},{"id":58,"name":59,"tactic":183},{"name":61},{"id":67,"name":68,"tactic":185},{"name":70},{"id":81,"name":82,"tactic":187},{"name":75},{"id":90,"name":91,"tactic":189},{"name":88},{"id":99,"name":100,"tactic":191},{"name":97},{"id":103,"name":104,"tactic":193},{"name":97},{"id":107,"name":108,"tactic":195},{"name":97},{"id":94,"name":95,"tactic":197},{"name":97},{"id":111,"name":112,"tactic":199},{"name":97},{"id":115,"name":116,"tactic":201},{"name":97},{"id":119,"name":120,"tactic":203},{"name":97},{"id":205,"name":206,"techniques":207},"CAPEC-267","Leverage Alternate Encoding",[208],{"id":209,"name":210,"tactics":211,"countermeasures":214},"T1027","Obfuscated Files or Information",[212,213],{"id":29,"name":30},{"id":32,"name":33},[215,217,219,221,223,225,227,229,231,233,235,237,239,241,243],{"id":41,"name":42,"tactic":216},{"name":44},{"id":46,"name":47,"tactic":218},{"name":44},{"id":50,"name":51,"tactic":220},{"name":44},{"id":54,"name":55,"tactic":222},{"name":44},{"id":58,"name":59,"tactic":224},{"name":61},{"id":67,"name":68,"tactic":226},{"name":70},{"id":81,"name":82,"tactic":228},{"name":75},{"id":90,"name":91,"tactic":230},{"name":88},{"id":99,"name":100,"tactic":232},{"name":97},{"id":103,"name":104,"tactic":234},{"name":97},{"id":107,"name":108,"tactic":236},{"name":97},{"id":94,"name":95,"tactic":238},{"name":97},{"id":111,"name":112,"tactic":240},{"name":97},{"id":115,"name":116,"tactic":242},{"name":97},{"id":119,"name":120,"tactic":244},{"name":97},{"id":246,"name":247,"techniques":248},"CAPEC-64","Using Slashes and URL Encoding Combined to Bypass Validation Logic",[],{"id":250,"name":251,"techniques":252},"CAPEC-72","URL Encoding",[],{"id":254,"name":255,"techniques":256},"CAPEC-76","Manipulating Web Input to File System Calls",[],{"id":258,"name":259,"techniques":260},"CAPEC-78","Using Escaped Slashes in Alternate Encoding",[],{"id":262,"name":263,"techniques":264},"CAPEC-79","Using Slashes in Alternate Encoding",[],{"id":266,"name":267,"techniques":268},"CAPEC-80","Using UTF-8 Encoding to Bypass Validation Logic",[],{"_key":270,"id":270,"name":271,"description":272,"type":15,"status":16,"abstraction":273,"likelihood_of_exploit":9,"capec":274},"CWE-610","Externally Controlled Reference to a Resource in Another Sphere","The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.","Class",[275],{"id":276,"name":277,"techniques":278},"CAPEC-219","XML Routing Detour Attacks",[],{"_key":280,"id":280,"name":281,"description":282,"type":15,"status":283,"abstraction":17,"likelihood_of_exploit":9,"capec":284},"CWE-918","Server-Side Request Forgery (SSRF)","The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.","Incomplete",[285],{"id":286,"name":287,"techniques":288},"CAPEC-664","Server Side Request Forgery",[],[],[],[],[],[],[],"2026-05-19T15:53:09.261Z","2026-05-19T17:08:41.193Z","Undergoing Analysis",{"cisa_kev":299,"cisa_ransomware":299,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":300,"severity_score":301,"severity_version":302,"severity_source":303,"severity_vector":304,"severity_status":297},false,"critical",9.3,"v4.0","cve.org","CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N",[306],{"url":307,"sources":308,"tags":310},"https://github.com/tenable/terrascan",[303,309],"nvd",[],[],[],[314,322],{"source":303,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":315,"cvss_v4_0":320},{"baseScore":316,"baseSeverity":317,"vectorString":318,"impactScore":4,"exploitabilityScore":319},7.5,"HIGH","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",10,{"baseScore":301,"baseSeverity":321,"vectorString":304,"impactScore":9,"exploitabilityScore":9},"CRITICAL",{"source":309,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":323,"cvss_v4_0":324},{"baseScore":316,"baseSeverity":317,"vectorString":318,"impactScore":4,"exploitabilityScore":319},{"baseScore":325,"baseSeverity":321,"vectorString":326,"impactScore":9,"exploitabilityScore":9},9.2,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[328],{"ecosystem":9,"name":329,"vendor":330,"product":331,"cpe_part":332,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":333},"Terrascan","tenable","terrascan","a",[334],{"version":335,"is_range":336,"range_type":303,"version_start":9,"version_start_type":9,"version_end":337,"version_end_type":338,"fixed_in":9},"\u003C= 1.18.3",true,"1.18.3","including"]