# Fusion Builder小于3.6.2版本存在未授权的SSRF漏洞
## 漏洞概述
Fusion Builder WordPress插件(版本3.6.2之前,用于Avada主题)中的一个表单参数未经过验证,这可能导致发起任意HTTP请求。返回的数据会在应用程序响应中反射回来,可能被用于访问服务器本地网络上的主机,绕过防火墙和访问控制措施。
## 影响版本
- Fusion Builder WordPress plugin 版本低于 3.6.2
## 漏洞细节
Fusion Builder 插件在处理表单参数时缺乏验证,攻击者可以利用这一点发起任意HTTP请求。服务器响应会将返回的数据反射出来。
## 漏洞影响
该漏洞可能被利用来与服务器本地网络上的主机进行交互,从而绕过防火墙和其他访问控制措施。这可能导致敏感信息泄露或其他未授权的操作。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | None | https://github.com/ardzz/CVE-2022-1386 | POC详情 |
2 | Automatic Mass Tool for checking vulnerability in CVE-2022-1386 - Fusion Builder < 3.6.2 - Unauthenticated SSRF | https://github.com/im-hanzou/fubucker | POC详情 |
3 | None | https://github.com/zycoder0day/CVE-2022-1386-Mass_Vulnerability | POC详情 |
4 | None | https://github.com/imhunterand/CVE-2022-1386 | POC详情 |
5 | None | https://github.com/satyasai1460/CVE-2022-1386 | POC详情 |
6 | Fusion Builder < 3.6.2 - Unauthenticated SSRF | https://github.com/lamcodeofpwnosec/CVE-2022-1386 | POC详情 |
7 | WordPress Fusion Builder plugin before 3.6.2 is susceptible to server-side request forgery. The plugin does not validate a parameter in its forms, which can be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. An attacker can potentially interact with hosts on the server's local network, bypass firewalls, and access control measures. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-1386.yaml | POC详情 |
8 | Fusion Builder < 3.6.2 - Unauthenticated SSRF | https://github.com/cur1y-dev/CVE-2022-1386 | POC详情 |
9 | Unauthenticated SSRF PoC in WordPress Fusion Builder <3.6.2 (CVE-2022-1386) | https://github.com/fayassgit/CVE-2022-1386-FusionBuilder-SSRF | POC详情 |
10 | Fusion Builder < 3.6.2 - Unauthenticated SSRF | https://github.com/ptrgits/CVE-2022-1386 | POC详情 |
暂无评论