| Title | Bytedesk <=1.3.9 SSRF |
|---|
| Description | The endpoint GET /gitee/api/v1/models passes a user-supplied apiUrl parameter directly to RestTemplate.exchange() without any URL validation or allowlist. The server issues an HTTP request to the attacker-controlled URL. DNS callback logs confirm the server-side request originating from the target, enabling SSRF attacks including internal network probing, cloud IMDS access, and potential credential exfiltration.
|
|---|
| Source | ⚠️ https://github.com/Bytedesk/bytedesk/issues/21 |
|---|
| User | ZAST.AI (UID 87884) |
|---|
| Submission | 02/26/2026 07:19 (1 month ago) |
|---|
| Moderation | 03/08/2026 08:20 (10 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 349756 [Bytedesk up to 1.3.9 SpringAIGiteeRestController SpringAIGiteeRestService.java getModels apiUrl server-side request forgery] |
|---|
| Points | 19 |
|---|