Description
Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4.
Problem types
CWE-918: Server-Side Request Forgery (SSRF)
CWE-1188: Insecure Default Initialization of Resource
Product status
References
github.com/...dibase/security/advisories/GHSA-7r9j-r86q-7g45
github.com/Budibase/budibase/pull/18236
github.com/...ommit/5b0fe83d4ece52696b62589cba89ef50cc009732
github.com/Budibase/budibase/releases/tag/3.33.4