提出 #784197: trueleaf apiflow ≤0.9.7 Server-Side Request Forgery情報

タイトルtrueleaf apiflow ≤0.9.7 Server-Side Request Forgery
説明ApiFlow is an API documentation management platform written in TypeScript/Node.js. The HTTP proxy functionality in the server component contains a Server-Side Request Forgery (SSRF) vulnerability that allows unauthenticated attackers to bypass URL validation and make arbitrary requests to internal network resources. The vulnerability exists in the `HttpProxyService` class where URL validation is performed only on the initial request URL, but not on redirect targets. By using an external redirect service, attackers can bypass the IP address allowlist and access internal services such as databases, cloud metadata endpoints, and other sensitive internal resources.
ソース⚠️ https://www.notion.so/Server-Side-Request-Forgery-SSRF-in-ApiFlow-329ea92a3c4180489df2fa2702078fe5
ユーザー
 din4 (UID 50867)
送信2026年03月20日 15:43 (14 日 ago)
モデレーション2026年03月21日 08:36 (17 hours later)
ステータス承諾済み
VulDBエントリ352316 [trueleaf ApiFlow 0.9.7 URL Validation http_proxy.service.ts validateUrlSecurity 特権昇格]
ポイント17

Do you know our Splunk app?

Download it now for free!