Submit #267484: Sparksuite SimpleMDE 1.11.2 Server-Side Request Forgery SSRFinfo

TitleSparksuite SimpleMDE 1.11.2 Server-Side Request Forgery SSRF
DescriptionAn unauthenticated attacker can make internal requests on the target server, with the aim of carrying out attacks on the victim's infrastructure, potentially opening new paths and exploitation combinations for other vulnerabilities. The vulnerability in the markdown converter service occurs due to the lack of treatment and validation of user input, allowing an attacker to use the following payload to view an internal service: <iframe src="http://127.0.0.1:PORT"></iframe> Poc Video: https://youtu.be/t-mDofraMcc References: https://owasp.org/www-community/attacks/Server_Side_Request_Forgery https://portswigger.net/web-security/ssrf
Source⚠️ https://github.com/sparksuite/simplemde-markdown-editor
User
 Anonymous User
Submission01/14/2024 01:12 (2 years ago)
Moderation01/17/2024 14:37 (4 days later)
StatusAccepted
VulDB entry251373 [Sparksuite SimpleMDE up to 1.11.2 iFrame cross site scripting]
Points20

Do you know our Splunk app?

Download it now for free!