Submit #632367: GitHub wblog 0.0.1 Server-Side Request Forgeryinfo

TitleGitHub wblog 0.0.1 Server-Side Request Forgery
DescriptionThe RestorePost function retrieves the user-controlled fileName parameter via c.PostForm("fileName") without any validation or sanitization. This parameter is directly concatenated with cfg.Qiniu.FileServer (which can be an empty string) to form fileUrl. When cfg.Qiniu.FileServer is empty, attackers can fully control fileUrl by crafting fileName (e.g., http://127.0.0.1:3306/), tricking the server into making unauthorized requests to arbitrary targets.
Source⚠️ https://github.com/on-theway/wblog/blob/main/README.md
User
 OnTheWay (UID 88937)
Submission08/12/2025 09:30 (9 months ago)
Moderation08/24/2025 16:28 (12 days later)
StatusAccepted
VulDB entry321231 [wangsongyan wblog 0.0.1 backup.go RestorePost fileName server-side request forgery]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!