Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.
Start learningThere is no fixed version for ai.
ai is an AI SDK by Vercel - The AI Toolkit for TypeScript and JavaScript
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to the order of operations in the validateDownloadUrl() implementation in download-blob.ts and download.ts. The fetch() operation called before applying validateDownloadUrl() follows redirects by default. This open redirect response is blocked by the SSRF protection such that it never makes it back to the application or the attacker, but the request made to the redirect target may still succeed, allowing operations on or disruption of internal resources.
curl -X POST http://127.0.0.1:3000/api/chat \
-H "Content-Type: application/json" \
-d '{"imageUrl": "http://httpbin.org/redirect-to?url=http%3A%2F%2F127.0.0.1%3A8560%2Fsecret_metadata"}'