Soumettre #632367: GitHub wblog 0.0.1 Server-Side Request Forgeryinformation

TitreGitHub wblog 0.0.1 Server-Side Request Forgery
DescriptionThe RestorePost function retrieves the user-controlled fileName parameter via c.PostForm("fileName") without any validation or sanitization. This parameter is directly concatenated with cfg.Qiniu.FileServer (which can be an empty string) to form fileUrl. When cfg.Qiniu.FileServer is empty, attackers can fully control fileUrl by crafting fileName (e.g., http://127.0.0.1:3306/), tricking the server into making unauthorized requests to arbitrary targets.
La source⚠️ https://github.com/on-theway/wblog/blob/main/README.md
Utilisateur
 OnTheWay (UID 88937)
Soumission12/08/2025 09:30 (il y a 9 mois)
Modérer24/08/2025 16:28 (12 days later)
StatutAccepté
Entrée VulDB321231 [wangsongyan wblog 0.0.1 backup.go RestorePost fileName élévation de privilèges]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!