Description
A vulnerability was identified in NucleoidAI Nucleoid up to 0.7.10. The impacted element is the function extension.apply of the file /src/cluster.ts of the component Outbound Request Handler. Such manipulation of the argument https/ip/port/path/headers leads to server-side request forgery. The attack may be performed from remote.
Es wurde eine Schwachstelle in NucleoidAI Nucleoid up to 0.7.10 entdeckt. Dabei betrifft es die Funktion extension.apply der Datei /src/cluster.ts der Komponente Outbound Request Handler. Mittels dem Manipulieren des Arguments https/ip/port/path/headers mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren.
Problem types
Product status
0.7.1
0.7.2
0.7.3
0.7.4
0.7.5
0.7.6
0.7.7
0.7.8
0.7.9
0.7.10
Timeline
2025-10-16: | Advisory disclosed |
2025-10-16: | VulDB entry created |
2025-10-16: | VulDB entry last update |
Credits
lakshay12311 (VulDB User)
References
vuldb.com/?id.328809 (VDB-328809 | NucleoidAI Nucleoid Outbound Request cluster.ts extension.apply server-side request forgery)
vuldb.com/?ctiid.328809 (VDB-328809 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.669928 (Submit #669928 | NucleoidAI Nucleoid 0.7.10 Server-Side Request Forgery)
github.com/lakshayyverma/CVE-Discovery/blob/main/Nucleoid.md