Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Proof-of-Concept for Server Side Request Forgery (SSRF) in request-baskets (<= v.1.2.1) | https://github.com/entr0pie/CVE-2023-27163 | POC Details |
| 2 | To assist in enumerating the webserver behind the webserver SSRF CVE-2023-27163 | https://github.com/seanrdev/cve-2023-27163 | POC Details |
| 3 | CVE-2023-27163 | https://github.com/overgrowncarrot1/CVE-2023-27163 | POC Details |
| 4 | Poc of SSRF for Request-Baskets (CVE-2023-27163) | https://github.com/ThickCoco/CVE-2023-27163-POC | POC Details |
| 5 | PoC CVE-2023-27163, SSRF, request-baskets hasta v1.2.1 | https://github.com/davuXVI/CVE-2023-27163 | POC Details |
| 6 | Requests Baskets (CVE-2023-27163) and Mailtrail v0.53 | https://github.com/HusenjanDev/CVE-2023-27163-AND-Mailtrail-v0.53 | POC Details |
| 7 | CVE-2023-27163 - Request Baskets SSRF | https://github.com/rvizx/CVE-2023-27163 | POC Details |
| 8 | Golang PoC for CVE-2023-27163 Mailtrail Exploit | https://github.com/thomas-osgood/CVE-2023-27163 | POC Details |
| 9 | CVE-2023-27163 Request-Baskets v1.2.1 - Server-side request forgery (SSRF) | https://github.com/0xFTW/CVE-2023-27163 | POC Details |
| 10 | A tool to perform port scanning using vulnerable Request-Baskets | https://github.com/samh4cks/CVE-2023-27163-InternalProber | POC Details |
| 11 | Python implementation of CVE-2023-27163 | https://github.com/Hamibubu/CVE-2023-27163 | POC Details |
| 12 | CVE-2023-27163 Request-Baskets v1.2.1 - Server-side request forgery (SSRF) | https://github.com/cowsecurity/CVE-2023-27163 | POC Details |
| 13 | this is a script that exploits the CVE-2023-27163 vulnerability which is request-basket SSRF | https://github.com/KharimMchatta/basketcraft | POC Details |
| 14 | Proof of Concept for Server Side Request Forgery (SSRF) in request-baskets (V<= v.1.2.1) | https://github.com/MasterCode112/CVE-2023-27163 | POC Details |
| 15 | Request Baskets vulnerable exploit to Server-Side Request Forgery up to version 1.2.1 | https://github.com/mathias-mrsn/CVE-2023-27163 | POC Details |
| 16 | A exploit for the CVE-2023-27163 (SSRF) vulnerability in the web application request-baskets (<= v.1.2.1) | https://github.com/Rubioo02/CVE-2023-27163 | POC Details |
| 17 | PoC for SSRF in request-baskets v1.2.1 (CVE-2023-27163) | https://github.com/madhavmehndiratta/CVE-2023-27163 | POC Details |
| 18 | It is a simple script to automate internal port scanning dueto SSRF in requests-baskets v 1.2.1. this script can also assisst in solving 'SAU' machine from hackthebox | https://github.com/Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning | POC Details |
| 19 | None | https://github.com/btar1gan/exploit_CVE-2023-27163 | POC Details |
| 20 | SSRF CVE-2023-27163 + maltrail vuln RCE | https://github.com/G4sp4rCS/htb-sau-automated | POC Details |
| 21 | Request Baskets is exposed. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/misconfiguration/request-baskets-exposure.yaml | POC Details |
| 22 | CVE-2023-27163 Request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request. This POC utilizes the SSRF to perfrom RCE. | https://github.com/lukehebe/CVE-2023-27163 | POC Details |
| 23 | Proof of Concept exploit for Server Side Request Forgery vulnerability in Requests Basket v1.2.1 and before. | https://github.com/J0ey17/Exploit_CVE-2023-27163 | POC Details |
| 24 | PoC and internal port brute-forcer for CVE-2023-27163 | https://github.com/theopaid/CVE-2023-27163-Request-Baskets-Local-Ports-Bruteforcer | POC Details |
| 25 | Request-Baskets <= 1.2.1 allows unauthenticated SSRF via the forward_url parameter when creating a new basket. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-27163.yaml | POC Details |
| 26 | A exploit for the CVE-2023-27163 (SSRF) vulnerability in the web application request-baskets (<= v.1.2.1) | https://github.com/apaz-dev/CVE-2023-27163 | POC Details |
| 27 | CVE-2023-27163 Request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request. This POC utilizes the SSRF to perfrom RCE. | https://github.com/lukehebe/CVE-2023-27163-POC | POC Details |
| 28 | Exploit for CVE-2023-27163 - SSRF Baskets Requests | https://github.com/thealchimist86/CVE-2023-27163---SSRF-Baskets-Requests | POC Details |
| 29 | Exploit for CVE-2023-27163 - Maltrail(0.53) - RCE | https://github.com/thealchimist86/CVE-2023-27163---Maltrail-0.53---RCE | POC Details |
No public POC found.
Login to generate AI POCNo comments yet