| عنوان | cskefu v8 Server-Side Request Forgery |
|---|
| الوصف | A vulnerability has been found in cskefu v8. This vulnerability affects the function url of the file com/cskefu/cc/controller/resource/MediaController.java. The manipulation of the argument url with the input pointing to internal network resources leads to server-side request forgery (SSRF). The application exposes an endpoint /res/url which takes a user-controlled URL. While there is a regular expression check (^https?://.*/.*$), it only validates the protocol and the presence of a path, but fails to restrict requests to the local loopback interface or internal network segments. This allows remote attackers to scan internal ports, access internal service metadata |
|---|
| المصدر | ⚠️ https://fx4tqqfvdw4.feishu.cn/docx/Vrs6dRx79ondtCxldz2cvupdnMe |
|---|
| المستخدم | xcxr (UID 86629) |
|---|
| ارسال | 03/02/2026 02:31 AM (3 أشهر منذ) |
|---|
| الاعتدال | 15/02/2026 06:44 PM (13 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 346164 [cskefu حتى 8.0.1 Endpoint MediaController.java url تجاوز الصلاحيات] |
|---|
| النقاط | 20 |
|---|