제출 #687573: lKinderBueno Streamity Xtream IPTV Web player 2.8 Server-Side Request Forgery정보

제목lKinderBueno Streamity Xtream IPTV Web player 2.8 Server-Side Request Forgery
설명A high-severity Server-Side Request Forgery (SSRF) vulnerability exists in Streamity's proxy.php where the application accepts a url parameter, validates it only with filter_var(..., FILTER_VALIDATE_URL), and then issues outbound requests using file_get_contents() (and forwards POST bodies) without any host/IP allowlist, private-range checks, or redirect/IP resolution validation. An attacker able to control the url parameter can force the server to make arbitrary HTTP requests to internal or external hosts, including cloud metadata endpoints, internal admin interfaces, or localhost services.
원천⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/Streamity.md
사용자
 lakshay12311 (UID 91298)
제출2025. 11. 02. PM 01:50 (6 개월 ago)
모더레이션2025. 11. 23. PM 03:30 (21 days later)
상태수락
VulDB 항목333352 [lKinderBueno Streamity Xtream IPTV Player 까지 2.8 public/proxy.php 권한 상승]
포인트들20

Interested in the pricing of exploits?

See the underground prices here!