| Titel | devlikeapro WAHA 0.0.1 Server-Side Request Forgery |
|---|
| Beschreibung | WAHA media conversion endpoints accept user-provided file URLs and fetch them server-side. The input URL flows from authenticated API requests into session.fetch(...), then to axios.get(url, ...) without destination controls (no private-range blocking, no allowlist). This creates an authenticated SSRF condition usable by any API key holder with session access. |
|---|
| Quelle | ⚠️ https://github.com/wing3e/public_exp/issues/36 |
|---|
| Benutzer | BigW (UID 96422) |
|---|
| Einreichung | 02.04.2026 11:41 (vor 24 Tagen) |
|---|
| Moderieren | 24.04.2026 20:55 (22 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 359522 [devlikeapro WAHA bis 2026.3.4 API Request media.controller.ts erweiterte Rechte] |
|---|
| Punkte | 18 |
|---|