Loading HuntDB...

Internal Ports Scanning via Blind SSRF

I
Infogram
Submitted None
Reported by tungpun

Vulnerability Details

Technical details and impact analysis

Information Disclosure
## Introduction: I found a Blind SSRF issue that allows scanning internal ports. ## How to reproduce: * Login * Send the request `https://infogram.com/api/web_resource/url?q=[TARGET_URI]` * Look up the response. If valid, it returns status code 200 and the website's title will be exposed, or 404 for otherwise. For demonstration, I try scanning the *localhost* with a limited port range, then found some available ports: *80*, *81*, *6000*. And here is the PoC: ``` GET /api/web_resource/url?q=http://0:6000/ HTTP/1.1 ... ``` Response: ``` HTTP/1.1 200 OK ... [{"title":"Create Infographics, Charts and Maps - Infogram","description":"Infogram is an easy to use infographic and chart maker. Create and share beautiful infographics, online charts and interactive maps. Make your own here.","url":"http://0:6000/"}] ``` As the filter does not validate the input, it allows the attacker to make the GET request to the internal network. In conclusion, I think internal addresses should not be allowed.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure