| 标题 | Kodbox 1.64 Server |
|---|
| 描述 | The explorer/editor/fileGet endpoint in kodbox accepts a path parameter and, if it is a URL, uses PathDriverUrl to fetch the resource server-side, returning the body in data.content. The only guard, request_url_safe(), does not block internal/private addresses and allows HTTP(S)/FTP. Thus, any authenticated user can set path to an arbitrary URL, causing the kodbox server to issue requests to internal services and return their responses, enabling a powerful SSRF with full response exfiltration.
To mitigate this, kodbox should stop accepting arbitrary URLs as path in fileGet, or—if remote reads are necessary—enforce strict domain allowlisting, robust IP/netblock restrictions, scheme/port limits, safe redirect handling, and thorough logging and access control for all remote fetch operations. |
|---|
| 来源 | ⚠️ https://vulnplus-note.wetolink.com/share/UTZQq38f9VyI |
|---|
| 用户 | vulnplusbot (UID 96250) |
|---|
| 提交 | 2026-03-09 04時22分 (1 月前) |
|---|
| 管理 | 2026-03-22 12時40分 (13 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 352425 [kalcaddle kodbox 1.64 fileGet Endpoint editor.class.php PathDriverUrl path 权限提升] |
|---|
| 积分 | 18 |
|---|