Server-Side Request Forgery (SSRF) in kalcaddle/kodexplorer
Jun 20th 2021
SSRF via SVG due to improper processing of SVG files.
🕵️♂️ Proof of Concept
Payload: https://drive.google.com/file/d/1q-GHJ01p8Ssok1GWN-QxSznBy1JGvY8x/view?usp=sharing Download and upload it on the server and run the server on port 8000 and then view the file.
This vulnerability is capable of SSRF
We have contacted a member of the kalcaddle/kodexplorer team and are waiting to hear back 2 years ago
commented 2 years ago
Thanks,we will fixed it soon. Administrators can set disabled file types
to join this conversation