{"id":"AZL-77639","summary":"CVE-2026-25765 affecting package rubygem-faraday 2.5.2-1","details":"Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Prior to 2.14.1, Faraday's build_exclusive_url method (in lib/faraday/connection.rb) uses Ruby's URI#merge to combine the connection's base URL with a user-supplied path. Per RFC 3986, protocol-relative URLs (e.g. //evil.com/path) are treated as network-path references that override the base URL's host/authority component. This means that if any application passes user-controlled input to Faraday's get(), post(), build_url(), or other request methods, an attacker can supply a protocol-relative URL like //attacker.com/endpoint to redirect the request to an arbitrary host, enabling Server-Side Request Forgery (SSRF). This vulnerability is fixed in 2.14.1.","modified":"2026-04-21T04:34:19.513459Z","published":"2026-02-09T21:15:49Z","upstream":["CVE-2026-25765"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25765"}],"affected":[{"package":{"name":"rubygem-faraday","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/rubygem-faraday"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"2.5.2-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-77639.json"}}],"schema_version":"1.7.5"}