| Title | Exrick https://github.com/Exrick/xboot <=3.3.4 SSRF |
|---|
| Description | A SSRF vulnerability was discovered on the endpoint /xboot/common/swagger/login in latest version (v3.3.4) of xboot. The target URI parameter for network requests is user-controllable and lacks sufficient security processing, resulting in an SSRF vulnerability that allows attackers to exploit this flaw to probe and exploit internal services of the target system. |
|---|
| Source | ⚠️ https://github.com/Exrick/xboot/issues/70 |
|---|
| User | ZAST.AI (UID 87884) |
|---|
| Submission | 07/25/2025 03:24 (9 months ago) |
|---|
| Moderation | 08/04/2025 08:51 (10 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 318653 [Exrick xboot up to 3.3.4 Swagger SecurityController.java loginUrl server-side request forgery] |
|---|
| Points | 19 |
|---|