551 Star 5.1K Fork 2.1K

yadong.zhang/OneBlog

 / 详情

OneBlog v2.3.4 background SSRF vulnerability

待办的
创建于  
2022-06-15 00:35

vulnerability Abstract

There are two SSRF vulnerabilities in OneBlog v2.3.4, one in adding friendly links and the other in the article porter function, which can be exploited by attackers to initiate probes on intranet services.

Scope of influence

OneBlog v2.3.4

vulnerability Reappearance

The first SSRF vulnerability:

To log in to the system using the account password root/123456, click Lab-> Article Porter Module
输入图片说明
Vulnerability parameter:entryUrls

We can use python to set up a HTTP service as the target server,Judge whether the service is enabled according to the response result of the server accessing the target URL

This vulnerability can realize the function of intranet port detection, access different ports, open echoes will be different

If the port is open, it will take more than a thousand Millisecond

输入图片说明
If the port is shut down, it will take more than two thousand Millisecond,You can see that if the service is not enabled, the request takes almost twice as long.
输入图片说明
The request record for the HTTP server is as follows:
输入图片说明

The second SSRF vulnerability

After logging in, click website Management-> Link module, add a link, and enter the URL of the test at the Logo parameter.Click Save,When saving, a request will be made to the target URL
输入图片说明
Then refreshing the link will also request the target URL.

Then check the access record of the HTTP service
输入图片说明

评论 (2)

qumh 创建了任务
qumh 修改了描述
qumh 修改了描述
qumh 修改了描述
展开全部操作日志

第二个,应该不是,图片默认会加载数据,是从client发送的,如果是请给出代码证明

第二个复现了一下,确实不是

登录 后才可以发表评论

状态
负责人
里程碑
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
开始日期   -   截止日期
-
置顶选项
优先级
参与者(3)
Java
1
https://gitee.com/yadong.zhang/DBlog.git
git@gitee.com:yadong.zhang/DBlog.git
yadong.zhang
DBlog
OneBlog

搜索帮助

Cb406eda 1850385 E526c682 1850385