Submit #386432: ltcms.com ltcms V1.0.20 SSRFinfo

Titleltcms.com ltcms V1.0.20 SSRF
DescriptionIn ltcms, there is an API endpoint "api/test/download" that can be used to perform a blind SSRF attack. The corresponding page for this endpoint is located at "app/api/controller/Test.php". This page does not require authentication, allowing anyone to call curl_exec() to request a URL specified in the url parameter. Additionally, due to the lack of protocol filtering, protocols like file, dict, etc., can be used to initiate requests to the internal network.
Source⚠️ https://github.com/DeepMountains/Mirage/blob/main/CVE14-1.md
User
 Dee.Mirage (UID 71702)
Submission08/06/2024 06:10 AM (2 years ago)
Moderation08/13/2024 04:13 PM (7 days later)
StatusAccepted
VulDB entry274360 [wanglongcn ltcms 1.0.20 API Endpoint /api/test/download url server-side request forgery]
Points20

Do you know our Splunk app?

Download it now for free!