إرسال #262599: Youke365 Youke365 ≤v1.5.3 SSRFالمعلومات

عنوانYouke365 Youke365 ≤v1.5.3 SSRF
الوصفThe Youke365 software, in versions up to and including 1.5.3, contains a blind Server-Side Request Forgery (SSRF) vulnerability within the /app/api/controller/caiji.php file. This vulnerability allows an attacker to manipulate the url parameter to send data to or make requests to the internal network. The issue arises because the input url parameter is directly used in constructing cURL requests without proper sanitization, particularly when using the gopher protocol, which can facilitate communication with the attacker's server, demonstrating the potential for unauthorized access to the internal system from an external network.
المصدر⚠️ https://note.zhaoj.in/share/fssH60eQkvSl
المستخدم
 glzjin (UID 59815)
ارسال05/01/2024 03:20 AM (2 سنوات منذ)
الاعتدال07/01/2024 09:00 PM (3 days later)
الحالةتمت الموافقة
إدخال VulDB249870 [Youke365 حتى 1.5.3 Parameter caiji.php url تجاوز الصلاحيات]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!