Soumettre #687573: lKinderBueno Streamity Xtream IPTV Web player 2.8 Server-Side Request Forgeryinformation

TitrelKinderBueno Streamity Xtream IPTV Web player 2.8 Server-Side Request Forgery
DescriptionA high-severity Server-Side Request Forgery (SSRF) vulnerability exists in Streamity's proxy.php where the application accepts a url parameter, validates it only with filter_var(..., FILTER_VALIDATE_URL), and then issues outbound requests using file_get_contents() (and forwards POST bodies) without any host/IP allowlist, private-range checks, or redirect/IP resolution validation. An attacker able to control the url parameter can force the server to make arbitrary HTTP requests to internal or external hosts, including cloud metadata endpoints, internal admin interfaces, or localhost services.
La source⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/Streamity.md
Utilisateur
 lakshay12311 (UID 91298)
Soumission02/11/2025 13:50 (il y a 6 mois)
Modérer23/11/2025 15:30 (21 days later)
StatutAccepté
Entrée VulDB333352 [lKinderBueno Streamity Xtream IPTV Player jusqu’à 2.8 public/proxy.php élévation de privilèges]
Points20

Do you need the next level of professionalism?

Upgrade your account now!