漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
PraisonAIAgents has SSRF via unvalidated URL in `web_crawl` httpx fallback
Vulnerability Description
PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, web_crawl's httpx fallback path passes user-supplied URLs directly to httpx.AsyncClient.get() with follow_redirects=True and no host validation. An LLM agent tricked into crawling an internal URL can reach cloud metadata endpoints (169.254.169.254), internal services, and localhost. The response content is returned to the agent and may appear in output visible to the attacker. This fallback is the default crawl path on a fresh PraisonAI installation (no Tavily key, no Crawl4AI installed). This vulnerability is fixed in 1.5.128.
CVSS Information
N/A
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
PraisonAI 代码问题漏洞
Vulnerability Description
PraisonAI是Mervin Praison个人开发者的一个低代码多智能体协作框架。 PraisonAI 1.5.128之前版本存在代码问题漏洞,该漏洞源于web_crawl的httpx回退路径将用户提供的URL直接传递给httpx.AsyncClient.get()且未进行主机验证,可能导致被诱骗的LLM代理访问云元数据端点、内部服务和本地主机,并将响应内容返回给攻击者。
CVSS Information
N/A
Vulnerability Type
N/A