Blind SSRF in emblem editor (2)
Medium
R
Rockstar Games
Submitted None
Actions:
Reported by
alexbirsan
Vulnerability Details
Technical details and impact analysis
Hello,
As per your recommendation in #233301, I'm submitting a PoC for another blind SSRF in the emblem editor.
To oversight here is allowing absolute `url()` values for the `fill` attribute:
`<path fill="url(https://requestb.in/15rxmgv1#test)" stroke="#a1a1a1" ... `
Upon publishing an emblem containing such an element, a HTTP request to the given URL is sent from a Rockstar server. (`███`). The destination port can be easily modified. This doesn't seem to work without including a fragment in the URL (`#test` in the example above).
Further testing showed that, if a valid SVG is found at the given URL, the `fill` data is actually used in the final image. Fortunately, ████████ doesn't seem to support scripts, although the possibility of finding another way to exfiltrate data doesn't seem that out of reach.
I've attached the full body of the emblem I've used to confirm this bug for ease of reproduction.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$1500.00
Submitted
Weakness
Server-Side Request Forgery (SSRF)