漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Squidex has Server-Side Request Forgery (SSRF) Issue in Webhook Configuration
Vulnerability Description
Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook configuration does not appear to validate or restrict destination IP addresses. It accepts local addresses such as 127.0.0.1 or localhost. When a rule is triggered (Either manual trigger by manually calling the trigger endpoint or by a content update or any other triggers), the backend server executes an HTTP request to the user-supplied URL. Crucially, the server logs the full HTTP response in the rule execution log (lastDump field), which is accessible via the API. Which turns a "Blind" SSRF into a "Full Read" SSRF. As of time of publication, no patched versions are available.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
Squidex 代码问题漏洞
Vulnerability Description
Squidex是Squidex开源的一个内容管理系统。 Squidex 7.21.0及之前版本存在代码问题漏洞,该漏洞源于Webhook配置中的URL参数未验证或限制目标IP地址,可能导致完全读取的服务端请求伪造。
CVSS Information
N/A
Vulnerability Type
N/A