Логотип exploitDog
bind:CVE-2025-25297
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-25297

Количество 2

Количество 2

nvd логотип

CVE-2025-25297

12 месяцев назад

Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's S3 storage integration feature contains a Server-Side Request Forgery (SSRF) vulnerability in its endpoint configuration. When creating an S3 storage connection, the application allows users to specify a custom S3 endpoint URL via the s3_endpoint parameter. This endpoint URL is passed directly to the boto3 AWS SDK without proper validation or restrictions on the protocol or destination. The vulnerability allows an attacker to make the application send HTTP requests to arbitrary internal services by specifying them as the S3 endpoint. When the storage sync operation is triggered, the application attempts to make S3 API calls to the specified endpoint, effectively making HTTP requests to the target service and returning the response in error messages. This SSRF vulnerability enables attackers to bypass network segmentation and access internal services that should not be accessible from the external

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-m238-fmcw-wh58

12 месяцев назад

Label Studio allows Server-Side Request Forgery in the S3 Storage Endpoint

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-25297

Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's S3 storage integration feature contains a Server-Side Request Forgery (SSRF) vulnerability in its endpoint configuration. When creating an S3 storage connection, the application allows users to specify a custom S3 endpoint URL via the s3_endpoint parameter. This endpoint URL is passed directly to the boto3 AWS SDK without proper validation or restrictions on the protocol or destination. The vulnerability allows an attacker to make the application send HTTP requests to arbitrary internal services by specifying them as the S3 endpoint. When the storage sync operation is triggered, the application attempts to make S3 API calls to the specified endpoint, effectively making HTTP requests to the target service and returning the response in error messages. This SSRF vulnerability enables attackers to bypass network segmentation and access internal services that should not be accessible from the external

CVSS3: 8.6
0%
Низкий
12 месяцев назад
github логотип
GHSA-m238-fmcw-wh58

Label Studio allows Server-Side Request Forgery in the S3 Storage Endpoint

CVSS3: 8.6
0%
Низкий
12 месяцев назад

Уязвимостей на страницу