| Title | mymagicpower AIAS <=1.0.0 SSRF |
|---|
| Description | A SSRF vulnerability was discovered on /api/asr/enAsrForLongAudioUrl, in latest version of AIAS. The target URI parameter for network requests is user-controllable and lacks sufficient security processing, resulting in an SSRF vulnerability that allows attackers to exploit this flaw to probe and exploit internal services of the target system. |
|---|
| Source | ⚠️ https://github.com/mymagicpower/AIAS/issues/55 |
|---|
| User | ZAST.AI (UID 87884) |
|---|
| Submission | 12/08/2025 08:45 (5 months ago) |
|---|
| Moderation | 12/25/2025 13:48 (17 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 303689 [mymagicpower AIAS 20250308 AsrController.java url server-side request forgery] |
|---|
| Points | 0 |
|---|