GHSA-hr92-4q35-4j3m: FlowiseAI/Flowise has Server-Side Request Forgery (SSRF) vulnerability
A Server-Side Request Forgery (SSRF) vulnerability was discovered in the /api/v1/fetch-links
endpoint of the Flowise application. This vulnerability allows an attacker to use the Flowise server as a proxy to access internal network web services and explore their link structures. The impact includes the potential exposure of sensitive internal administrative endpoints.
References
- github.com/FlowiseAI/Flowise
- github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/components/src/utils.ts
- github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/server/src/controllers/fetch-links/index.ts
- github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/server/src/services/fetch-links/index.ts
- github.com/FlowiseAI/Flowise/releases/tag/flowise%403.0.6
- github.com/FlowiseAI/Flowise/security/advisories/GHSA-hr92-4q35-4j3m
- github.com/advisories/GHSA-hr92-4q35-4j3m
Code Behaviors & Features
Detect and mitigate GHSA-hr92-4q35-4j3m with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →