漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
New API: SSRF Filter Bypass via 0.0.0.0
Vulnerability Description
New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. In versions 0.11.9-alpha.1 and prior, the SSRF protection introduced in v0.9.0.5 (CVE-2025-59146) and hardened in v0.9.6 (CVE-2025-62155) does not block the unspecified address 0.0.0.0. A regular (non-admin) user holding any valid API token can send a multimodal request to /v1/chat/completions, /v1/responses, or /v1/messages with 0.0.0.0 as the image/file URL host, bypassing the private-IP filter and causing the server to issue HTTP requests to localhost. This constitutes at minimum a blind SSRF; when the request is routed through an AWS/Bedrock Claude adaptor, the fetched content is inlined into the model response, upgrading it to a full-read SSRF. At time of publication, there are no publicly available patches.
CVSS Information
N/A
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
New API 代码问题漏洞
Vulnerability Description
New API是QuantumNous开源的一个接口软件。 New API 0.11.9-alpha.1及之前版本存在代码问题漏洞,该漏洞源于SSRF保护未阻止未指定地址0.0.0.0,可能导致持有有效API令牌的用户绕过私有IP过滤器向本地主机发出HTTP请求。
CVSS Information
N/A
Vulnerability Type
N/A