Server-Side Request Forgery (SSRF) in kalcaddle/kodexplorer
Valid
Reported on
Jun 20th 2021
✍️ Description
SSRF via SVG due to improper processing of SVG files.
🕵️♂️ Proof of Concept
Payload:
https://drive.google.com/file/d/1q-GHJ01p8Ssok1GWN-QxSznBy1JGvY8x/view?usp=sharing
Download and upload it on the server and run the server on port 8000 and then view the file.
💥 Impact
This vulnerability is capable of SSRF
Occurrences
We have contacted a member of the
kalcaddle/kodexplorer
team and are waiting to hear back
2 years ago
Thanks,we will fixed it soon. Administrators can set disabled file types
to join this conversation