Skip to content

Jpress has a SSRF Vulnerability #190

@ilikeoyt

Description

@ilikeoyt

Download the latest version and start it locally

image
Replication process:
Login to the backend and create a new data source

image
Select dynamic data source and add the ip of dnslog.

image
After submitting, you can get the id from the queryDatasources route.

image
Then use queryOptions route to trigger ssrf.

image
image

Code Analysis:
Come to src/main/jsrf
src/main/java/io/jpress/module/form/controller/admin/_FormDatasourceController.java file
The queryDatasources route corresponds to the method that can be used to query the ids

image
If the data is dynamic, the method corresponding to the queryOptions route calls the proxy.start method.

image
Finally, the doSendRequest method is called to trigger the ssrf.

image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions