Server-Side Request Forgery (SSRF) in erudika/scoold
Valid
Reported on
Jul 6th 2021
✍️ Description
Possible SSRF in scoold in user profile picture from URL
🕵️♂️ Proof of Concept
Steps to reproduce:
1. Create an account and click on the image.
2. Now open the local server or enter any IP:port ex: http://127.0.0.1:8082
3. Now enter the URL and then view the image, you will see get request.or you see changes in images
💥 Impact
Internal Port scan
Occurrences
We have contacted a member of the
erudika/scoold
team and are waiting to hear back
2 years ago
to join this conversation