Submit #262599: Youke365 Youke365 ≤v1.5.3 SSRFinfo

TitleYouke365 Youke365 ≤v1.5.3 SSRF
DescriptionThe Youke365 software, in versions up to and including 1.5.3, contains a blind Server-Side Request Forgery (SSRF) vulnerability within the /app/api/controller/caiji.php file. This vulnerability allows an attacker to manipulate the url parameter to send data to or make requests to the internal network. The issue arises because the input url parameter is directly used in constructing cURL requests without proper sanitization, particularly when using the gopher protocol, which can facilitate communication with the attacker's server, demonstrating the potential for unauthorized access to the internal system from an external network.
Source⚠️ https://note.zhaoj.in/share/fssH60eQkvSl
User
 glzjin (UID 59815)
Submission01/05/2024 03:20 (2 years ago)
Moderation01/07/2024 21:00 (3 days later)
StatusAccepted
VulDB entry249870 [Youke365 up to 1.5.3 Parameter caiji.php url server-side request forgery]
Points20

Interested in the pricing of exploits?

See the underground prices here!