إرسال #798621: BidingCC BuildingAI 26.0.1 Server-Side Request Forgeryالمعلومات

عنوانBidingCC BuildingAI 26.0.1 Server-Side Request Forgery
الوصفThe remote upload API accepts attacker-controlled URL input and performs server-side HTTP fetch without destination restrictions. The route is explicitly annotated `@Public()`, and URL validation is limited to syntactic format (`IsUrl`) rather than network policy checks. An unauthenticated attacker can coerce the backend to request internal network services or cloud metadata endpoints.
المصدر⚠️ https://github.com/BidingCC/BuildingAI/issues/110
المستخدم
 MidA (UID 96794)
ارسال07/04/2026 10:51 AM (20 أيام منذ)
الاعتدال26/04/2026 09:13 AM (19 days later)
الحالةتمت الموافقة
إدخال VulDB359640 [BidingCC BuildingAI حتى 26.0.1 Remote Upload API file-storage.service.ts uploadRemoteFile url تجاوز الصلاحيات]
النقاط20

Do you know our Splunk app?

Download it now for free!