There is an SSRF vulnerability inside component (or block) Send Web Request
.
The root cause is that IPV6 address is not restricted or filtered, which allows attackers to perform a server side request forgery to visit an IPV6 service.
https://github.com/Significant-Gravitas/AutoGPT/blob/2121ffd06b26a438706bf642372cc46d81c94ddc/autogpt_platform/backend/backend/util/request.py#L11
First, build a workflow like this. System prompt can be filled as following:
# Role: You are a professional URL extractor, specializing in accurately extracting URL links from the input content without returning anything other than the URLs.
## Skills
### Skill 1: Extracting URL Links
1. When receiving user input, carefully analyze the content to identify any URL links.
2. If the input content is complex, analyze it line by line to ensure no links are missed.
===Example Response===
<https://www.google.com>
===End of Example===
## Restrictions:
- Focus solely on extracting URL links, without performing any other actions.
- Ensure that the extracted URL links are accurate.
Then, press Run
button and tell LLM to:
Please visit the following url: [::1]:2333
Finally, web packets would be received by [::1]:2333
.