Submit #798621: BidingCC BuildingAI 26.0.1 Server-Side Request Forgeryinfo

TitleBidingCC BuildingAI 26.0.1 Server-Side Request Forgery
DescriptionThe remote upload API accepts attacker-controlled URL input and performs server-side HTTP fetch without destination restrictions. The route is explicitly annotated `@Public()`, and URL validation is limited to syntactic format (`IsUrl`) rather than network policy checks. An unauthenticated attacker can coerce the backend to request internal network services or cloud metadata endpoints.
Source⚠️ https://github.com/BidingCC/BuildingAI/issues/110
User
 MidA (UID 96794)
Submission04/07/2026 10:51 (20 days ago)
Moderation04/26/2026 09:13 (19 days later)
StatusAccepted
VulDB entry359640 [BidingCC BuildingAI up to 26.0.1 Remote Upload API file-storage.service.ts uploadRemoteFile url server-side request forgery]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!