WhisperX tag archive

#server-side-request-forgery

This page collects WhisperX intelligence signals tagged #server-side-request-forgery. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (2)

The Lab · 2026-04-25 16:54:08 · GitHub Issues

1. Critical SSRF Bypass Discovered: Empty DNS Resolution Arrays Can Evade Private IP Validation

A security researcher has identified and patched a Server-Side Request Forgery (SSRF) vulnerability in affected codebases. The flaw exploited how JavaScript's `dns.lookup()` function handles domain resolution when a maliciously crafted domain returns an empty address array. By supplying such a domain, an attacker could...

The Lab · 2026-05-05 12:31:39 · GitHub Issues

2. SSRF Vulnerability in AI Model Provider Configuration Allowed Internal Network Scanning

A server-side request forgery (SSRF) vulnerability was identified and remediated in AI model endpoints, enabling a tenant administrator to probe internal network services through user-supplied provider URLs. The flaw resided in the configuration interfaces for OpenAI, Azure OpenAI, and Ollama integrations, where the `b...