Submit #784197: trueleaf apiflow ≤0.9.7 Server-Side Request Forgeryinfo

Titeltrueleaf apiflow ≤0.9.7 Server-Side Request Forgery
BeschreibungApiFlow is an API documentation management platform written in TypeScript/Node.js. The HTTP proxy functionality in the server component contains a Server-Side Request Forgery (SSRF) vulnerability that allows unauthenticated attackers to bypass URL validation and make arbitrary requests to internal network resources. The vulnerability exists in the `HttpProxyService` class where URL validation is performed only on the initial request URL, but not on redirect targets. By using an external redirect service, attackers can bypass the IP address allowlist and access internal services such as databases, cloud metadata endpoints, and other sensitive internal resources.
Quelle⚠️ https://www.notion.so/Server-Side-Request-Forgery-SSRF-in-ApiFlow-329ea92a3c4180489df2fa2702078fe5
Benutzer
 din4 (UID 50867)
Einreichung20.03.2026 15:43 (vor 15 Tagen)
Moderieren21.03.2026 08:36 (17 hours later)
StatusAkzeptiert
VulDB Eintrag352316 [trueleaf ApiFlow 0.9.7 URL Validation http_proxy.service.ts validateUrlSecurity erweiterte Rechte]
Punkte17

Might our Artificial Intelligence support you?

Check our Alexa App!