Server-Side Request Forgery (SSRF) in kalcaddle/kodexplorer

Valid

Reported on

Jun 20th 2021


✍️ Description

SSRF protection bypass via crafted payload which leads to SSRF.

🕵️‍♂️ Proof of Concept

Payload:
2130706433

This is the decimal way of representing localhost which resolves to localhost.

💥 Impact

This vulnerability is capable of SSRF.

We have contacted a member of the kalcaddle/kodexplorer team and are waiting to hear back a year ago
warlee
a year ago

Maintainer


The current settings are allowed to be obtained through URL,

warlee validated this vulnerability a year ago
x3rz has been awarded the disclosure bounty
The fix bounty is now up for grabs
warlee confirmed that a fix has been merged on 6d2521 a year ago
warlee has been awarded the fix bounty
to join this conversation