提出 #262599: Youke365 Youke365 ≤v1.5.3 SSRF情報

タイトルYouke365 Youke365 ≤v1.5.3 SSRF
説明The Youke365 software, in versions up to and including 1.5.3, contains a blind Server-Side Request Forgery (SSRF) vulnerability within the /app/api/controller/caiji.php file. This vulnerability allows an attacker to manipulate the url parameter to send data to or make requests to the internal network. The issue arises because the input url parameter is directly used in constructing cURL requests without proper sanitization, particularly when using the gopher protocol, which can facilitate communication with the attacker's server, demonstrating the potential for unauthorized access to the internal system from an external network.
ソース⚠️ https://note.zhaoj.in/share/fssH60eQkvSl
ユーザー
 glzjin (UID 59815)
送信2024年01月05日 03:20 (2 年 ago)
モデレーション2024年01月07日 21:00 (3 days later)
ステータス承諾済み
VulDBエントリ249870 [Youke365 迄 1.5.3 Parameter caiji.php url 特権昇格]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!