Submit #632367: GitHub wblog 0.0.1 Server-Side Request Forgeryinfo

TitelGitHub wblog 0.0.1 Server-Side Request Forgery
BeschreibungThe RestorePost function retrieves the user-controlled fileName parameter via c.PostForm("fileName") without any validation or sanitization. This parameter is directly concatenated with cfg.Qiniu.FileServer (which can be an empty string) to form fileUrl. When cfg.Qiniu.FileServer is empty, attackers can fully control fileUrl by crafting fileName (e.g., http://127.0.0.1:3306/), tricking the server into making unauthorized requests to arbitrary targets.
Quelle⚠️ https://github.com/on-theway/wblog/blob/main/README.md
Benutzer
 OnTheWay (UID 88937)
Einreichung12.08.2025 09:30 (vor 9 Monaten)
Moderieren24.08.2025 16:28 (12 days later)
StatusAkzeptiert
VulDB Eintrag321231 [wangsongyan wblog 0.0.1 backup.go RestorePost fileName erweiterte Rechte]
Punkte20

Interested in the pricing of exploits?

See the underground prices here!