제출 #750708: cskefu v8 Server-Side Request Forgery정보

제목cskefu v8 Server-Side Request Forgery
설명A vulnerability has been found in cskefu v8. This vulnerability affects the function url of the file com/cskefu/cc/controller/resource/MediaController.java. The manipulation of the argument url with the input pointing to internal network resources leads to server-side request forgery (SSRF). The application exposes an endpoint /res/url which takes a user-controlled URL. While there is a regular expression check (^https?://.*/.*$), it only validates the protocol and the presence of a path, but fails to restrict requests to the local loopback interface or internal network segments. This allows remote attackers to scan internal ports, access internal service metadata
원천⚠️ https://fx4tqqfvdw4.feishu.cn/docx/Vrs6dRx79ondtCxldz2cvupdnMe
사용자
 xcxr (UID 86629)
제출2026. 02. 03. AM 02:31 (3 개월 ago)
모더레이션2026. 02. 15. PM 06:44 (13 days later)
상태수락
VulDB 항목346164 [cskefu 까지 8.0.1 Endpoint MediaController.java url 권한 상승]
포인트들20

Do you want to use VulDB in your project?

Use the official API to access entries easily!