제출 #632367: GitHub wblog 0.0.1 Server-Side Request Forgery정보

제목GitHub wblog 0.0.1 Server-Side Request Forgery
설명The RestorePost function retrieves the user-controlled fileName parameter via c.PostForm("fileName") without any validation or sanitization. This parameter is directly concatenated with cfg.Qiniu.FileServer (which can be an empty string) to form fileUrl. When cfg.Qiniu.FileServer is empty, attackers can fully control fileUrl by crafting fileName (e.g., http://127.0.0.1:3306/), tricking the server into making unauthorized requests to arbitrary targets.
원천⚠️ https://github.com/on-theway/wblog/blob/main/README.md
사용자
 OnTheWay (UID 88937)
제출2025. 08. 12. AM 09:30 (9 개월 ago)
모더레이션2025. 08. 24. PM 04:28 (12 days later)
상태수락
VulDB 항목321231 [wangsongyan wblog 0.0.1 backup.go RestorePost fileName 권한 상승]
포인트들20

Want to know what is going to be exploited?

We predict KEV entries!