提出 #795416: devlikeapro WAHA 0.0.1 Server-Side Request Forgery情報

タイトルdevlikeapro WAHA 0.0.1 Server-Side Request Forgery
説明WAHA media conversion endpoints accept user-provided file URLs and fetch them server-side. The input URL flows from authenticated API requests into session.fetch(...), then to axios.get(url, ...) without destination controls (no private-range blocking, no allowlist). This creates an authenticated SSRF condition usable by any API key holder with session access.
ソース⚠️ https://github.com/wing3e/public_exp/issues/36
ユーザー
 BigW (UID 96422)
送信2026年04月02日 11:41 (25 日 ago)
モデレーション2026年04月24日 20:55 (22 days later)
ステータス承諾済み
VulDBエントリ359522 [devlikeapro WAHA 迄 2026.3.4 API Request media.controller.ts 特権昇格]
ポイント18

Do you want to use VulDB in your project?

Use the official API to access entries easily!