| عنوان | BidingCC BuildingAI 26.0.1 Server-Side Request Forgery |
|---|
| الوصف | The remote upload API accepts attacker-controlled URL input and performs server-side HTTP fetch without destination restrictions. The route is explicitly annotated `@Public()`, and URL validation is limited to syntactic format (`IsUrl`) rather than network policy checks. An unauthenticated attacker can coerce the backend to request internal network services or cloud metadata endpoints. |
|---|
| المصدر | ⚠️ https://github.com/BidingCC/BuildingAI/issues/110 |
|---|
| المستخدم | MidA (UID 96794) |
|---|
| ارسال | 07/04/2026 10:51 AM (20 أيام منذ) |
|---|
| الاعتدال | 26/04/2026 09:13 AM (19 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 359640 [BidingCC BuildingAI حتى 26.0.1 Remote Upload API file-storage.service.ts uploadRemoteFile url تجاوز الصلاحيات] |
|---|
| النقاط | 20 |
|---|