提出 #795212: ericc-ch copilot-api 0.7.0 DNS Rebinding Attack情報

タイトルericc-ch copilot-api 0.7.0 DNS Rebinding Attack
説明The copilot-api HTTP server does not perform any validation on the Host header of incoming requests, allowing remote attackers to launch DNS rebinding attacks. An attacker can host a malicious web page that, after the initial DNS lookup, resolves to the victim’s localhost:4141, thereby bypassing the browser’s same-origin policy. Once the rebinding is successful, the attacker’s JavaScript can read responses from all copilot-api endpoints—including the /token endpoint, which returns the Copilot Bearer token in plaintext—and exfiltrate this information to a server controlled by the attacker.
ソース⚠️ https://github.com/August829/CVEP/issues/32
ユーザー
 Yu_Bao (UID 89348)
送信2026年04月02日 04:58 (22 日 ago)
モデレーション2026年04月22日 20:21 (21 days later)
ステータス承諾済み
VulDBエントリ359039 [ericc-ch copilot-api 迄 0.7.0 Header /token Host 特権昇格]
ポイント20

Do you need the next level of professionalism?

Upgrade your account now!