Server-Side Request Forgery (SSRF) in erudika/scoold

Valid

Reported on

Jul 6th 2021


✍️ Description

Possible SSRF in scoold in user profile picture from URL

🕵️‍♂️ Proof of Concept

Steps to reproduce:
1. Create an account and click on the image.
2. Now open the local server or enter any IP:port ex: http://127.0.0.1:8082
3. Now enter the URL and then view the image, you will see get request.or you see changes in images

💥 Impact

Internal Port scan

We have contacted a member of the erudika/scoold team and are waiting to hear back 2 years ago
Alex Bogdanovski validated this vulnerability 2 years ago
x3rz has been awarded the disclosure bounty
The fix bounty is now up for grabs
Alex Bogdanovski marked this as fixed with commit cfd640 2 years ago
Alex Bogdanovski has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation