Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-27163 PoC — request-baskets 代码问题漏洞

Source
Associated Vulnerability
Title:request-baskets 代码问题漏洞 (CVE-2023-27163)
Description:request-baskets是rbaskets开源的一个Web服务。 request-baskets v1.2.1版本及之前版本存在安全漏洞,该漏洞源于通过组件/api/baskets/{name}发现包含服务器端请求伪造 (SSRF)漏洞。攻击者利用该漏洞通过特制的API请求访问网络资源和敏感信息。
Description
PoC and internal port brute-forcer for CVE-2023-27163
Readme
# CVE-2023-27163 - Request-Baskets SSRF Proof of Concept

This is a proof-of-concept (PoC) exploit and a localhost port bruteforcer for **CVE-2023-27163**, a server-side request forgery (SSRF) vulnerability in [Request-Baskets](https://github.com/darklynx/request-baskets).

The PoC abuses the forward_url parameter to perform a brute-force scan of active services bound to the local interface.
Once discovered, these services can then be accessed by the attacker through the vulnerable forwarding mechanism.

---

## Description

- CVE: [CVE-2023-27163](https://nvd.nist.gov/vuln/detail/CVE-2023-27163)
- Affected: Request-Baskets
- Impact: Allows an attacker to trigger SSRF to internal addresses

---

## Requirements

- Python 3.x
- `requests` library
```bash
pip install requests
```

## Usage

```bash
python3 CVE-2023-27163.py -u https://TARGET_URL -b BASKET_NAME -p ports.txt
```

File Snapshot

[4.0K] /data/pocs/ab32ea710c670fe81a9b95ae3364db5005f314e9 ├── [4.7K] CVE-2023-27163.py ├── [ 889] README.md ├── [ 41K] top-ports-10000.txt ├── [4.9K] top-ports-1000.txt └── [ 25K] top-ports-5000.txt 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.