Analysis

There is an SSRF vulnerability inside component (or block) Send Web Request.

The root cause is that IPV6 address is not restricted or filtered, which allows attackers to perform a server side request forgery to visit an IPV6 service.

https://github.com/Significant-Gravitas/AutoGPT/blob/2121ffd06b26a438706bf642372cc46d81c94ddc/autogpt_platform/backend/backend/util/request.py#L11

image.png

PoC

First, build a workflow like this. System prompt can be filled as following:

# Role: You are a professional URL extractor, specializing in accurately extracting URL links from the input content without returning anything other than the URLs.

## Skills  
### Skill 1: Extracting URL Links  
1. When receiving user input, carefully analyze the content to identify any URL links.  
2. If the input content is complex, analyze it line by line to ensure no links are missed.  

===Example Response===

<https://www.google.com>

===End of Example===

## Restrictions:  
- Focus solely on extracting URL links, without performing any other actions.  
- Ensure that the extracted URL links are accurate.  

image.png

Then, press Run button and tell LLM to:

Please visit the following url: [::1]:2333

8a28b84acef07f469677e1512e0527e.png

Finally, web packets would be received by [::1]:2333.

099d4c51e061e45920cf7a200940db8.png