Status: Acknowledged - No fix available
Description: The ip package (version ≤2.0.1) used by bittorrent-tracker has a Server-Side Request Forgery (SSRF) vulnerability related to improper categorization in the isPublic method.
- CVE: GHSA-2p57-rm9w-gvfp
- CVSS Score: 8.1 (High)
- Affected Package:
ip(transitive dependency viabittorrent-tracker) - Direct Dependency:
bittorrent-tracker@11.2.2(latest version)
Mitigation:
- The vulnerability is in a transitive dependency with no patched version available
- The
bittorrent-trackerpackage is already using the latest version (11.2.2) - The
ippackage has no newer versions beyond 2.0.1 (which is vulnerable) - The actual usage of the
ippackage inbittorrent-trackeris minimal and primarily for IP address parsing - The SSRF risk is low in typical PigeonWT deployments as the tracker doesn't make outbound requests based on user-controlled IP addresses
Recommendations:
- Monitor for updates to either
iporbittorrent-trackerpackages - Consider network-level protections (firewall rules, network segmentation)
- Run the tracker in isolated network environments when possible
- Regularly check for updates:
npm auditandnpm outdated
Tracking:
- Watch for updates to
bittorrent-trackerthat may switch to an alternative package - Monitor the
ippackage repository for security patches: https://github.com/indutny/node-ip
-
Network Isolation
- Run trackers in isolated network segments
- Use firewall rules to restrict outbound connections
- Implement rate limiting at the network level
-
Regular Updates
- Keep dependencies up to date:
npm update - Monitor security advisories:
npm audit - Subscribe to GitHub security advisories for dependencies
- Keep dependencies up to date:
-
Access Control
- Use environment variables for sensitive configuration
- Never commit secrets or API keys to the repository
- Implement authentication if deploying publicly
-
Monitoring
- Monitor server logs for suspicious activity
- Track resource usage and connection patterns
- Set up alerts for unusual traffic patterns
-
Web Interface Security
- The demo page uses CSP-safe DOM methods (no
innerHTMLwith user data) - All user input is properly escaped using
textContent - WebTorrent connections are peer-to-peer with WebRTC encryption
- The demo page uses CSP-safe DOM methods (no
If you discover a security vulnerability in PigeonWT, please report it by:
- Opening a private security advisory on GitHub
- Or emailing the maintainers directly
Please do not open public issues for security vulnerabilities.
- 2025-10-25: Initial security review completed
- Fixed XSS vulnerability in demo page (commit b8532f8)
- Documented known
ippackage vulnerability - No critical issues found in application code