| タイトル | BidingCC BuildingAI 26.0.1 Server-Side Request Forgery |
|---|
| 説明 | The remote upload API accepts attacker-controlled URL input and performs server-side HTTP fetch without destination restrictions. The route is explicitly annotated `@Public()`, and URL validation is limited to syntactic format (`IsUrl`) rather than network policy checks. An unauthenticated attacker can coerce the backend to request internal network services or cloud metadata endpoints. |
|---|
| ソース | ⚠️ https://github.com/BidingCC/BuildingAI/issues/110 |
|---|
| ユーザー | MidA (UID 96794) |
|---|
| 送信 | 2026年04月07日 10:51 (20 日 ago) |
|---|
| モデレーション | 2026年04月26日 09:13 (19 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 359640 [BidingCC BuildingAI 迄 26.0.1 Remote Upload API file-storage.service.ts uploadRemoteFile url 特権昇格] |
|---|
| ポイント | 20 |
|---|