Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
SillyTavern: Incomplete IP validation in /api/search/visit allows SSRF via localhost and IPv6
Vulnerability Description
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, in src/endpoints/search.js, the hostname is checked against /^\d+\.\d+\.\d+\.\d+$/. This only matches literal dotted-quad IPv4 (e.g. 127.0.0.1, 10.0.0.1). It does not catch: localhost (hostname, not dotted-quad), [::1] (IPv6 loopback), and DNS names resolving to internal addresses (e.g. localtest.me -> 127.0.0.1). A separate port check (urlObj.port !== '') limits exploitation to services on default ports (80/443), making this lower severity than a fully unrestricted SSRF. This issue has been patched in version 1.17.0.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
SillyTavern 代码问题漏洞
Vulnerability Description
SillyTavern是SillyTavern开源的一个大语言模型的前端界面。 SillyTavern 1.17.0之前版本存在代码问题漏洞,该漏洞源于主机名检查仅匹配字面点分十进制IPv4地址,可能导致服务端请求伪造攻击。
CVSS Information
N/A
Vulnerability Type
N/A