{"id":"UBUNTU-CVE-2026-25765","details":"Faraday is an HTTP client library abstraction layer that provides a common interface over many adapters. Prior to 2.14.1, Faraday's build_exclusive_url method (in lib/faraday/connection.rb) uses Ruby's URI#merge to combine the connection's base URL with a user-supplied path. Per RFC 3986, protocol-relative URLs (e.g. //evil.com/path) are treated as network-path references that override the base URL's host/authority component. This means that if any application passes user-controlled input to Faraday's get(), post(), build_url(), or other request methods, an attacker can supply a protocol-relative URL like //attacker.com/endpoint to redirect the request to an arbitrary host, enabling Server-Side Request Forgery (SSRF). This vulnerability is fixed in 2.14.1.","modified":"2026-02-12T05:31:37Z","published":"2026-02-09T21:15:00Z","upstream":["CVE-2026-25765"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-25765"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2026-25765"},{"type":"REPORT","url":"https://github.com/lostisland/faraday/commit/a6d3a3a0bf59c2ab307d0abd91bc126aef5561bc"},{"type":"REPORT","url":"https://github.com/lostisland/faraday/releases/tag/v2.14.1"},{"type":"REPORT","url":"https://github.com/lostisland/faraday/security/advisories/GHSA-33mh-2634-fwr2"}],"affected":[{"package":{"name":"ruby-faraday","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/ruby-faraday@0.8.7-1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.8.7-1"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-faraday","binary_version":"0.8.7-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25765.json"}},{"package":{"name":"ruby-faraday","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/ruby-faraday@0.9.2-3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.9.1-1","0.9.2-3"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-faraday","binary_version":"0.9.2-3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25765.json"}},{"package":{"name":"ruby-faraday","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/ruby-faraday@0.9.2-3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.9.2-3"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-faraday","binary_version":"0.9.2-3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25765.json"}},{"package":{"name":"ruby-faraday","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ruby-faraday@0.15.4-3ubuntu0.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.15.4-3","0.15.4-3ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-faraday","binary_version":"0.15.4-3ubuntu0.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25765.json"}},{"package":{"name":"ruby-faraday","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/ruby-faraday@1.1.0-7?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1.0-6","1.1.0-7"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-faraday","binary_version":"1.1.0-7"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25765.json"}},{"package":{"name":"ruby-faraday","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/ruby-faraday@2.7.1-2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.1.0-7","2.7.1-2"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-faraday","binary_version":"2.7.1-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25765.json"}},{"package":{"name":"ruby-faraday","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/ruby-faraday@2.12.2-1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.10.0-2","2.12.2-1"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-faraday","binary_version":"2.12.2-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-25765.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}