漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Ech0 Affected by Unauthenticated Server-Side Request Forgery in Website Preview Feature
Vulnerability Description
Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, Ech0 implements link preview (editor fetches a page title) through GET /api/website/title. That is legitimate product behavior, but the implementation is unsafe: the route is unauthenticated, accepts a fully attacker-controlled URL, performs a server-side GET, reads the entire response body into memory (io.ReadAll). There is no host allowlist, no SSRF filter, and InsecureSkipVerify: true on the outbound client. Anyone who can reach the instance can force the Ech0 server to open HTTP/HTTPS URLs of their choice as seen from the server’s network position (Docker bridge, VPC, localhost from the process view). This vulnerability is fixed in 4.2.8.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
Ech0 代码问题漏洞
Vulnerability Description
Ech0是L1nSn0w个人开发者的一个自托管个人微博客平台。 Ech0 4.2.8之前版本存在代码问题漏洞,该漏洞源于通过GET /api/website/title实现链接预览时,该路由未经身份验证且接受完全由攻击者控制的URL,可能导致服务器端请求伪造。
CVSS Information
N/A
Vulnerability Type
N/A