You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**Vulnerability:** The `/api/proxy/<path:url>` endpoint accepted and requested any URL provided by the user, including `localhost` and private IP ranges. This allowed potential access to internal network services or the proxy server itself.
3
+
**Learning:** Proxy applications are inherently vulnerable to SSRF. Relying on "it's just a local tool" is insufficient as it might be deployed in containers or environments with access to other services.
4
+
**Prevention:** Implemented strict URL validation (`is_safe_url`) that resolves the hostname and checks if the IP belongs to private/loopback blocks before making the request. Also added timeouts and generic error messages to prevent DoS and info leakage.
0 commit comments