| Título | Page Replica 1.0 Server-Side Request Forgery |
|---|
| Descripción | A Server-Side Request Forgery vulnerability (CWE-918) exists in the sitemap scraping functionality. The /sitemap endpoint accepts a user-controlled url parameter and directly passes it to sitemap.fetch() without any validation, sanitization, or allowlist restrictions. This behavior allows an attacker to supply arbitrary URLs, causing the server to initiate outbound requests to attacker-specified destinations.
Because the request originates from the server environment, an attacker may abuse this functionality to access internal network services, cloud metadata endpoints, or other resources that are otherwise inaccessible from the internet. |
|---|
| Fuente | ⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/page_replica.md |
|---|
| Usuario | lakshay12311 (UID 91298) |
|---|
| Sumisión | 2026-03-11 07:34 (hace 24 días) |
|---|
| Moderación | 2026-03-26 17:02 (15 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 353658 [Page-Replica Page Replica hasta e4a7f52e75093ee318b4d5a9a9db6751050d2ad0 Endpoint /sitemap sitemap.fetch url escalada de privilegios] |
|---|
| Puntos | 20 |
|---|