إرسال #267484: Sparksuite SimpleMDE 1.11.2 Server-Side Request Forgery SSRFالمعلومات

عنوانSparksuite SimpleMDE 1.11.2 Server-Side Request Forgery SSRF
الوصفAn unauthenticated attacker can make internal requests on the target server, with the aim of carrying out attacks on the victim's infrastructure, potentially opening new paths and exploitation combinations for other vulnerabilities. The vulnerability in the markdown converter service occurs due to the lack of treatment and validation of user input, allowing an attacker to use the following payload to view an internal service: <iframe src="http://127.0.0.1:PORT"></iframe> Poc Video: https://youtu.be/t-mDofraMcc References: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery https://portswigger.net/web-security/ssrf
المصدر⚠️ https://github.com/sparksuite/simplemde-markdown-editor
المستخدم
 Anonymous User
ارسال14/01/2024 01:12 AM (2 سنوات منذ)
الاعتدال17/01/2024 02:37 PM (4 days later)
الحالةتمت الموافقة
إدخال VulDB251373 [Sparksuite SimpleMDE حتى 1.11.2 iFrame البرمجة عبر المواقع]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!