| タイトル | trueleaf apiflow ≤0.9.7 Server-Side Request Forgery |
|---|
| 説明 | ApiFlow is an API documentation management platform written in TypeScript/Node.js. The HTTP proxy functionality in the server component contains a Server-Side Request Forgery (SSRF) vulnerability that allows unauthenticated attackers to bypass URL validation and make arbitrary requests to internal network resources.
The vulnerability exists in the `HttpProxyService` class where URL validation is performed only on the initial request URL, but not on redirect targets. By using an external redirect service, attackers can bypass the IP address allowlist and access internal services such as databases, cloud metadata endpoints, and other sensitive internal resources. |
|---|
| ソース | ⚠️ https://www.notion.so/Server-Side-Request-Forgery-SSRF-in-ApiFlow-329ea92a3c4180489df2fa2702078fe5 |
|---|
| ユーザー | din4 (UID 50867) |
|---|
| 送信 | 2026年03月20日 15:43 (14 日 ago) |
|---|
| モデレーション | 2026年03月21日 08:36 (17 hours later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 352316 [trueleaf ApiFlow 0.9.7 URL Validation http_proxy.service.ts validateUrlSecurity 特権昇格] |
|---|
| ポイント | 17 |
|---|