sglang is vulnerable to Exposure of Resource to Wrong Sphere
88
High Risk
Affected versions of this package do not restrict the MessageQueue component from binding to all available TCP interfaces (e.g., 0.0.0.0), which exposes the service to external network access by default. This can increase the attack surface, especially if the message queue is intended for internal use only. Without proper binding to a loopback address (e.g., 127.0.0.1) or explicit configuration, remote attackers may be able to interact with or exploit the message queue service, potentially leading to unauthorized access, data leakage, or further attacks depending on the queue’s capabilities and access controls.
You are affected if you are using a version of this package 0.4.7.
sglang is vulnerable to Exposure of Resource to Wrong Sphere in versions 0.4.0 - 0.4.6.post5.
Upgrade the sglang library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant