| タイトル | Youke365 Youke365 ≤v1.5.3 SSRF |
|---|
| 説明 | The Youke365 platform, specifically its version up to 1.5.3, contains a blind Server-Side Request Forgery (SSRF) vulnerability within the /app/api/controller/collect.php file. This issue arises when a user-supplied 'url' parameter is improperly handled and passed to a cURL function, allowing an attacker to initiate requests to arbitrary URLs, including potentially sensitive internal services, as demonstrated by intercepting a custom 'gopher' protocol request on a listening server with the payload '_test123'. |
|---|
| ソース | ⚠️ https://note.zhaoj.in/share/3jF3Xpl3ttlZ |
|---|
| ユーザー | glzjin (UID 59815) |
|---|
| 送信 | 2024年01月05日 04:07 (2 年 ago) |
|---|
| モデレーション | 2024年01月07日 21:01 (3 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 249871 [Youke365 迄 1.5.3 collect.php url 特権昇格] |
|---|
| ポイント | 20 |
|---|