Gửi #792417: moxi624 mogu_blog_v2 0.0.1 Injectionthông tin

tiêu đềmoxi624 mogu_blog_v2 0.0.1 Injection
Mô tảThe Mogu Blog V2 application supports OAuth authentication through multiple providers including Gitee, GitHub, QQ, and WeChat. During the OAuth callback process, the application extracts the user's avatar URL from the OAuth provider's response and forwards it to the picture storage service (mogu-picture) for downloading and storage. The critical security flaw is that the application completely trusts the OAuth provider's response without validating the avatar URL. The picture storage service then makes HTTP requests to whatever URL is provided, without any whitelist validation, protocol checking, or IP address validation. This creates a Server-Side Request Forgery (SSRF) vulnerability where an attacker controlling the OAuth response can force the server to request arbitrary URLs.
Nguồn⚠️ https://github.com/ccccccctiiiiiiii-lab/public_exp/issues/3
Người dùng
 cccccccti (UID 96695)
Đệ trình29/03/2026 16:32 (cách đây 23 ngày)
Kiểm duyệt19/04/2026 18:38 (21 days later)
Trạng tháiđược chấp nhận
Mục VulDB358260 [moxi624 Mogu Blog v2 đến 5.2 Picture Storage Service LocalFileServiceImpl.java LocalFileServiceImpl.uploadPictureByUrl nâng cao đặc quyền]
điểm20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!