提交 #791084: SuperAGI up to c3c1982 Server-Side Request Forgery (CWE-918)信息

标题SuperAGI up to c3c1982 Server-Side Request Forgery (CWE-918)
描述# Technical Details A Server-Side Request Forgery (SSRF) vulnerability exists in the `extract_with_bs4` method in `superagi/helper/webpage_extractor.py` of SuperAGI. The application fails to validate or restrict the URL passed to `requests.get()` by the WebScraperTool, allowing any authenticated user to make the server perform HTTP requests to arbitrary internal or external hosts. # Vulnerable Code File: superagi/helper/webpage_extractor.py (line 101) Method: extract_with_bs4, extract_with_3k (line 50/63), extract_with_lxml (line 144) Why: The URL from agent goals is passed directly to `requests.get(url, headers=headers, timeout=10)` with no validation of URL scheme, target hostname/IP (no blocklist for private ranges like 127.0.0.0/8, x.x.x.x), or redirect destinations. The response content is returned to the attacker through the execution feed API, making this a full (non-blind) SSRF. # Reproduction 1. Create an agent with WebScraperTool and goal: "Fetch content from http://x.x.x.x/latest/meta-data/" 2. Trigger the agent: PUT /agentexecutions/update/{id} with {"status": "RUNNING"} 3. Wait for execution and read results: GET /agentexecutionfeeds/get/execution/{id} 4. The internal response content is returned in the execution feed. # Impact - Cloud Credential Theft: Fetches IAM credentials from AWS metadata endpoint (http://x.x.x.x/latest/meta-data/iam/security-credentials/). - Internal Network Scanning: Probes internal hosts and ports behind the firewall. - Non-Blind SSRF: Response content (up to 600 words) is returned directly to the attacker via the execution feed API. - Exploitable by any authenticated user, including lowest-privilege accounts.
来源⚠️ https://gist.github.com/YLChen-007/4bb1d709cbb58cee46d839c651d3221f
用户
 Eric-y (UID 95889)
提交2026-03-27 13時04分 (24 日前)
管理2026-04-19 18時14分 (23 days later)
状态已接受
VulDB条目358251 [TransformerOptimus SuperAGI 直到 0.0.14 WebScraperTool webpage_extractor.py 权限提升]
积分20

Interested in the pricing of exploits?

See the underground prices here!