<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>BidingCC — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/bidingcc/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/bidingcc/feed.xml" rel="self" type="application/rss+xml"/><item><title>BidingCC BuildingAI SSRF Vulnerability (CVE-2026-7065)</title><link>https://feed.craftedsignal.io/briefs/2024-01-buildingai-ssrf/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-buildingai-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in BidingCC BuildingAI up to version 26.0.1, allowing remote attackers to manipulate the `url` argument in the `uploadRemoteFile` function of `file-storage.service.ts` to conduct SSRF attacks.</description><content:encoded><![CDATA[<p>BidingCC BuildingAI, up to version 26.0.1, is vulnerable to a server-side request forgery (SSRF) attack. The vulnerability resides within the <code>uploadRemoteFile</code> function located in <code>packages/core/src/modules/upload/services/file-storage.service.ts</code>. An attacker can remotely manipulate the <code>url</code> argument passed to this function to force the server to make requests to arbitrary internal or external resources. This vulnerability has been publicly disclosed and is considered exploitable. The vendor was notified of the issue, but has not responded. Successful exploitation can lead to information disclosure, internal service compromise, or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a BidingCC BuildingAI instance running a vulnerable version (&lt;= 26.0.1).</li>
<li>Attacker crafts a malicious URL containing the address of an internal resource or external server.</li>
<li>Attacker calls the <code>uploadRemoteFile</code> API endpoint, providing the crafted URL as the <code>url</code> argument.</li>
<li>The <code>uploadRemoteFile</code> function, without proper validation, uses the provided URL to initiate a request.</li>
<li>The BuildingAI server makes an HTTP request to the attacker-specified URL.</li>
<li>If the URL points to an internal resource, the server retrieves sensitive data from that resource.</li>
<li>If the URL points to an external server controlled by the attacker, the server may leak internal information (e.g., internal IP addresses) or be used for further attacks.</li>
<li>The attacker receives the response from the manipulated request, achieving information disclosure or a foothold for further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SSRF vulnerability (CVE-2026-7065) in BidingCC BuildingAI can lead to the exposure of sensitive internal information, such as configuration files, internal service endpoints, and potentially database credentials. This information can be leveraged to further compromise the BuildingAI instance or other internal systems. The impact is significant due to the potential for lateral movement and privilege escalation within the affected organization&rsquo;s infrastructure. The lack of vendor response exacerbates the risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to detect exploitation attempts against the <code>uploadRemoteFile</code> endpoint (Log source: webserver).</li>
<li>Implement strict input validation and sanitization on the <code>url</code> parameter of the <code>uploadRemoteFile</code> function to prevent arbitrary URL requests (CVE-2026-7065).</li>
<li>Consider restricting outbound network access from the BuildingAI server to only necessary resources to limit the impact of successful SSRF attacks.</li>
<li>Monitor web server logs for unusual requests originating from the BuildingAI server to detect potential SSRF activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-7065</category><category>web-application</category></item></channel></rss>