Security vulnerability Server-Side Request Forgery (SSRF)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Mistral |
New
|
Undecided
|
Unassigned |
Bug Description
Hi team,
I've just found the vulnerability from mistral.
Environment:
Openstack version Yoga.
Step to reproduce:
1. Go to mistral-dashboard
Workflow > Workbooks > Create Workbook > Direct Input
Workflow > Workflows > Create Workflows > Direct Input
Workfloư > Actions > Create Action > Direct Input
2. Input string: Some internal URL that only can access from a safe way like VPN or from a private zone
3. Enter Validation and mistral will make the request to that URL and send back the response from the internal system (I also attached the evidence from my test site).
With this risk, attackers can bypass the firewall to make many of requests for scanning the operator's internal system. If the internal app is not secure, system hijacking is inevitable.
information type: | Private Security → Public Security |