| 제목 | Casdoor v2.356.0 Server-Side Request Forgery |
|---|
| 설명 | Webhook SSRF (Server-Side Request Forgery)
**Evidence:**
```go
req, err := http.NewRequest(webhook.Method, webhook.Url, body)
// ...
resp, err := client.Do(req) // No URL validation, no internal network blocking
```
Admin-configured webhook URLs are fetched without any restriction on target address. No SSRF protections are in place.
**Attack scenario:** An attacker who gains org-admin access configures a webhook URL pointing to `http://x.x.x.x/latest/meta-data/` (AWS metadata endpoint) or internal services, exfiltrating cloud credentials or scanning internal infrastructure.
**Fix:** Validate webhook URLs against a denylist of private/reserved IP ranges. Use a dedicated HTTP client that resolves DNS and blocks connections to internal addresses.
--- |
|---|
| 사용자 | Ghufran Khan (UID 95493) |
|---|
| 제출 | 2026. 03. 17. PM 02:25 (22 날 ago) |
|---|
| 모더레이션 | 2026. 04. 03. AM 09:26 (17 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 355073 [Casdoor 2.356.0 Webhook URL 권한 상승] |
|---|
| 포인트들 | 17 |
|---|