TypeBot: SSRF via Open Redirect Bypass in HTTP Request and Code Blocks
Description
TypeBot is a chatbot builder tool. Versions 3.15.2 and prior contain an SSRF via Open Redirect Bypass as the HTTP Request block and Code block validate the initial request URL via validateHttpReqUrl() to block private IPs and cloud metadata hostnames. However, the HTTP clients (ky and fetch) follow 302 redirects without re-validating the redirect destination. An authenticated user can point a bot block to an attacker-controlled server that responds with a redirect to an internal IP, causing the Typebot server to reach internal services. An authenticated Typebot user can reach AWS metadata (169.254.169.254), private subnets, and container-internal services. Exploitable to extract cloud IAM credentials or probe internal APIs inaccessible from the internet. This issue has been fixed in version 3.16.0.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/baptisteArno/typebot.io/releases/tag/v3.16.0mitrex_refsource_MISC
- github.com/baptisteArno/typebot.io/security/advisories/GHSA-jxv3-m939-w95cmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.