POC详情: 33533b89679715e2dd838c069e92a1ce7d3df1d0

来源
关联漏洞
标题: request-baskets 代码问题漏洞 (CVE-2023-27163)
描述:request-baskets是rbaskets开源的一个Web服务。 request-baskets v1.2.1版本及之前版本存在安全漏洞,该漏洞源于通过组件/api/baskets/{name}发现包含服务器端请求伪造 (SSRF)漏洞。攻击者利用该漏洞通过特制的API请求访问网络资源和敏感信息。
描述
this is a script that exploits the CVE-2023-27163 vulnerability which is request-basket SSRF
介绍
# basketcraft
this is a script that exploits the CVE-2023-27163 vulnerability which is an SSRF in the request-baskets version 1.2.1

# SSRF on Request-Baskets (CVE-2023–27163)
CVE-2023–27163 represents a critical Server-Side Request Forgery (SSRF) vulnerability that was identified in Request-Baskets, affecting all versions up to 1.2.1. This particular vulnerability grants malicious actors the ability to gain unauthorized access to network resources and sensitive information by exploiting the /api/baskets/{name} component through carefully crafted API requests.

# How it works
Request-Baskets is a web application designed to collect and log incoming HTTP requests directed to specific endpoints known as “baskets”. During the creation of these baskets, users have the flexibility to specify alternative servers to which these requests should be forwarded. The critical issue is that users can inadvertently specify services they shouldn’t have access to, including those typically restricted within a network environment.

For example, we have a request server running Request-Baskets on port 55555 and simultaneously run a Flask web server on port 2054 The Flask server, however, is configured to exclusively interact with the internal network, with this in mind the attacker can exploit the SSRF vulnerability by creating a basket that forwards requests to http://internal_network:2054, effectively bypassing the previous network restrictions and gaining access to the Flask web server, which should have been restricted to internal network access only.
文件快照

[4.0K] /data/pocs/33533b89679715e2dd838c069e92a1ce7d3df1d0 ├── [1.9K] basketcraft.sh └── [1.5K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。