Server-Side Request Forgery (SSRF) in kalcaddle/kodexplorer

Valid

Reported on

Jun 20th 2021


✍️ Description

SSRF protection bypass via crafted payload which leads to SSRF.

🕵️‍♂️ Proof of Concept

Payload:
2130706433

This is the decimal way of representing localhost which resolves to localhost.

💥 Impact

This vulnerability is capable of SSRF.

We have contacted a member of the kalcaddle/kodexplorer team and are waiting to hear back 2 years ago
warlee
2 years ago

Maintainer


The current settings are allowed to be obtained through URL,

warlee validated this vulnerability 2 years ago
x3rz has been awarded the disclosure bounty
The fix bounty is now up for grabs
warlee marked this as fixed with commit 6d2521 2 years ago
warlee has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation