| Title | ltcms.com ltcms V1.0.20 SSRF |
|---|
| Description | In ltcms, there is an API endpoint "api/test/download" that can be used to perform a blind SSRF attack. The corresponding page for this endpoint is located at "app/api/controller/Test.php". This page does not require authentication, allowing anyone to call curl_exec() to request a URL specified in the url parameter. Additionally, due to the lack of protocol filtering, protocols like file, dict, etc., can be used to initiate requests to the internal network. |
|---|
| Source | ⚠️ https://github.com/DeepMountains/Mirage/blob/main/CVE14-1.md |
|---|
| User | Dee.Mirage (UID 71702) |
|---|
| Submission | 08/06/2024 06:10 AM (2 years ago) |
|---|
| Moderation | 08/13/2024 04:13 PM (7 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 274360 [wanglongcn ltcms 1.0.20 API Endpoint /api/test/download url server-side request forgery] |
|---|
| Points | 20 |
|---|