| Título | ericc-ch copilot-api 0.7.0 DNS Rebinding Attack |
|---|
| Descrição | The copilot-api HTTP server does not perform any validation on the Host header of incoming requests, allowing remote attackers to launch DNS rebinding attacks. An attacker can host a malicious web page that, after the initial DNS lookup, resolves to the victim’s localhost:4141, thereby bypassing the browser’s same-origin policy. Once the rebinding is successful, the attacker’s JavaScript can read responses from all copilot-api endpoints—including the /token endpoint, which returns the Copilot Bearer token in plaintext—and exfiltrate this information to a server controlled by the attacker. |
|---|
| Fonte | ⚠️ https://github.com/August829/CVEP/issues/32 |
|---|
| Utilizador | Yu_Bao (UID 89348) |
|---|
| Submissão | 02/04/2026 04h58 (há 25 dias) |
|---|
| Moderação | 22/04/2026 20h21 (21 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 359039 [ericc-ch copilot-api até 0.7.0 Header /token Host Elevação de Privilégios] |
|---|
| Pontos | 20 |
|---|