漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Saloon is vulnerable to SSRF and credential leakage via absolute URL in endpoint overriding base URL
Vulnerability Description
Saloon is a PHP library that gives users tools to build API integrations and SDKs. Prior to version 4.0.0, when building the request URL, Saloon combined the connector's base URL with the request endpoint. If the endpoint was a valid absolute URL, the code used that URL as-is and ignored the base URL. The request—and any authentication headers, cookies, or tokens attached by the connector—was then sent to the attacker-controlled host. If the endpoint could be influenced by user input or configuration (e.g. redirect_uri, callback URL), this allowed server-side request forgery (SSRF) and/or credential leakage to a third-party host. The fix in version 4.0.0 is to reject absolute URLs in the endpoint: URLHelper::join() throws InvalidArgumentException when the endpoint is a valid absolute URL, unless explicitly allowed, requiring callers to opt-in to the functionality on a per-connector or per-request basis.
CVSS Information
N/A
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
Saloon 代码问题漏洞
Vulnerability Description
Saloon是Saloon PHP开源的一个PHP API集成与SDK构建库。 Saloon 4.0.0之前版本存在代码问题漏洞,该漏洞源于构建请求URL时,如果端点是有效的绝对URL,则代码会忽略基础URL,可能导致服务端请求伪造和或凭据泄露到第三方主机。
CVSS Information
N/A
Vulnerability Type
N/A