Отправить #765558: welovemedia FFmate <= v2.0.15 Server-Side Request ForgeryИнформация

Названиеwelovemedia FFmate <= v2.0.15 Server-Side Request Forgery
ОписаниеA Server-Side Request Forgery (SSRF) vulnerability exists in FFmate ≤ v2.0.15 at the webhook functionality, where user-controlled URLs are directly used to initiate HTTP requests without validation or restriction on the target destination. As a result, attackers can configure webhook URLs pointing to internal resources, which are then accessed by the server when webhook events are triggered. This enables attackers to probe internal network services, access metadata endpoints, bypass firewall restrictions, perform port scanning of internal infrastructure, and potentially exfiltrate sensitive data from services that should not be externally accessible. Mitigations include implementing strict URL validation with allowlists of permitted domains and protocols, blocking requests to private IP ranges, using a dedicated egress proxy with filtering capabilities, implementing network segmentation to isolate the application server from sensitive internal services, and conducting thorough security reviews of all external request functionality.
Источник⚠️ https://github.com/CC-T-454455/Vulnerabilities/tree/master/ffmate/vulnerability-1
Пользователь
 Anonymous User
Представление22.02.2026 16:47 (2 месяцы назад)
Модерация06.03.2026 22:29 (12 days later)
Статуспринято
Запись VulDB349583 [welovemedia FFmate до 2.0.15 webhook.go fireWebhook эскалация привилегий]
Баллы20

Do you need the next level of professionalism?

Upgrade your account now!