关联漏洞
标题:
request-baskets 代码问题漏洞
(CVE-2023-27163)
描述:request-baskets是rbaskets开源的一个Web服务。 request-baskets v1.2.1版本及之前版本存在安全漏洞,该漏洞源于通过组件/api/baskets/{name}发现包含服务器端请求伪造 (SSRF)漏洞。攻击者利用该漏洞通过特制的API请求访问网络资源和敏感信息。
描述
PoC for SSRF in request-baskets v1.2.1 (CVE-2023-27163)
介绍
# CVE-2023-27163
This is a PoC for [CVE-2023-27163](https://github.com/advisories/GHSA-58g2-vgpg-335q) which is a SSRF vulnerability present in [request-baskets](https://github.com/darklynx/request-baskets) upto `v1.2.1`.
This vulnerability allows attackers to access sensitive network resources via `/api/baskets/{name}`.
The request-baskets contains a functionality where a user can specify another server to forward the requests.
The issue here is that the user can also specify unintended services, such as network-closed internal applications.
## Usage
```
$ python3 CVE-2023-27163.py --help
Usage: python3 CVE-2023-27163.py <URL> <TARGET>
Arguments:
URL main path (/) of the server (eg. http://node-app:55555)
TARGET r-baskets target server (eg. http://127.0.0.1:80)
```
## References
- [https://github.com/darklynx/request-baskets](https://github.com/darklynx/request-baskets)
- [https://notes.sjtu.edu.cn/s/MUUhEymt7](https://notes.sjtu.edu.cn/s/MUUhEymt7)
- [https://nvd.nist.gov/vuln/detail/CVE-2023-27163](https://nvd.nist.gov/vuln/detail/CVE-2023-27163)
- [https://github.com/advisories/GHSA-58g2-vgpg-335q](https://github.com/advisories/GHSA-58g2-vgpg-335q)
文件快照
[4.0K] /data/pocs/189648d0dcbeb600547a191963e51156631ff92c
├── [1.8K] CVE-2023-27163.py
└── [1.2K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。