提交 #687573: lKinderBueno Streamity Xtream IPTV Web player 2.8 Server-Side Request Forgery信息

标题lKinderBueno Streamity Xtream IPTV Web player 2.8 Server-Side Request Forgery
描述A high-severity Server-Side Request Forgery (SSRF) vulnerability exists in Streamity's proxy.php where the application accepts a url parameter, validates it only with filter_var(..., FILTER_VALIDATE_URL), and then issues outbound requests using file_get_contents() (and forwards POST bodies) without any host/IP allowlist, private-range checks, or redirect/IP resolution validation. An attacker able to control the url parameter can force the server to make arbitrary HTTP requests to internal or external hosts, including cloud metadata endpoints, internal admin interfaces, or localhost services.
来源⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/Streamity.md
用户
 lakshay12311 (UID 91298)
提交2025-11-02 13時50分 (6 月前)
管理2025-11-23 15時30分 (21 days later)
状态已接受
VulDB条目333352 [lKinderBueno Streamity Xtream IPTV Player 直到 2.8 public/proxy.php 权限提升]
积分20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!