A Server-Side Request Forgery (SSRF) vulnerability was identified in the Requests utility of significant-gravitas/autogpt versions prior to v0.4.0. The vulnerability arises due to a hostname confusion between the `urlparse` function from the `urllib.parse` library and the `requests` library. A malicious user can exploit this by submitting a specially crafted URL, such as `http://localhost:\@google.com/../`, to bypass the SSRF check and perform an SSRF attack.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Server-Side Request Forgery (SSRF) vulnerability was identified in the Requests utility of significant-gravitas/autogpt versions prior to v0.4.0. The vulnerability arises due to a hostname confusion between the `urlparse` function from the `urllib.parse` library and the `requests` library. A malicious user can exploit this by submitting a specially crafted URL, such as `http://localhost:\@google.com/../`, to bypass the SSRF check and perform an SSRF attack. | |
Title | SSRF Check Bypass in Requests Utility in significant-gravitas/autogpt | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:11:30.365Z
Updated: 2025-03-20T15:22:14.163Z
Reserved: 2025-01-13T23:36:39.819Z
Link: CVE-2025-0454

Updated: 2025-03-20T15:21:00.751Z

Status : Received
Published: 2025-03-20T10:15:53.157
Modified: 2025-03-20T10:15:53.157
Link: CVE-2025-0454

No data.