提出 #687573: lKinderBueno Streamity Xtream IPTV Web player 2.8 Server-Side Request Forgery情報

タイトルlKinderBueno Streamity Xtream IPTV Web player 2.8 Server-Side Request Forgery
説明A high-severity Server-Side Request Forgery (SSRF) vulnerability exists in Streamity's proxy.php where the application accepts a url parameter, validates it only with filter_var(..., FILTER_VALIDATE_URL), and then issues outbound requests using file_get_contents() (and forwards POST bodies) without any host/IP allowlist, private-range checks, or redirect/IP resolution validation. An attacker able to control the url parameter can force the server to make arbitrary HTTP requests to internal or external hosts, including cloud metadata endpoints, internal admin interfaces, or localhost services.
ソース⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/Streamity.md
ユーザー
 lakshay12311 (UID 91298)
送信2025年11月02日 13:50 (6 月 ago)
モデレーション2025年11月23日 15:30 (21 days later)
ステータス承諾済み
VulDBエントリ333352 [lKinderBueno Streamity Xtream IPTV Player 迄 2.8 public/proxy.php 特権昇格]
ポイント20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!