| Title | BidingCC BuildingAI 26.0.1 Server-Side Request Forgery |
|---|
| Description | The remote upload API accepts attacker-controlled URL input and performs server-side HTTP fetch without destination restrictions. The route is explicitly annotated `@Public()`, and URL validation is limited to syntactic format (`IsUrl`) rather than network policy checks. An unauthenticated attacker can coerce the backend to request internal network services or cloud metadata endpoints. |
|---|
| Source | ⚠️ https://github.com/BidingCC/BuildingAI/issues/110 |
|---|
| User | MidA (UID 96794) |
|---|
| Submission | 04/07/2026 10:51 (20 days ago) |
|---|
| Moderation | 04/26/2026 09:13 (19 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 359640 [BidingCC BuildingAI up to 26.0.1 Remote Upload API file-storage.service.ts uploadRemoteFile url server-side request forgery] |
|---|
| Points | 20 |
|---|