Loading HuntDB...

SSRF - pivoting in the private LAN

Low
C
Concrete CMS
Submitted None
Reported by adrian_t

Vulnerability Details

Technical details and impact analysis

Server-Side Request Forgery (SSRF)
The upload from remote servers features allows me to perform SSRF attack on the private LAN servers. this features checks the following * http response code needs to be 200 - easy, a non issue for attackers really * checks the file exension (can be bypassed with something like http://192.168.1.148/index.php/test.png - anything after index.php/ is ignorred and I control the file extension as well) * some checks are performed on the IP, but any public and PRIVATE ips are allowed I can read web apps from the internal network, fingerprint them and exploit them (using GET only exploits). This is how I've managed to read an phpinfo file from my local LAN: http://192.168.1.157/info.php/test.html The file is fetched, saved by the CMS locally (or S3) and then the output can be downloaded by the attacker as you can see in the attached screenshots. ps: crayons ## Impact An attacker can pivot in the private LAN and exploit local network apps.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Server-Side Request Forgery (SSRF)