open-proxy-portscan: Open Proxy to Ports on the Proxy's localhost Interface

日期: 2025-08-01 | 影响软件: open-proxy-portscan | POC: 已公开

漏洞描述

The host is configured as a proxy which allows access to its internal interface

PoC代码[已公开]

id: open-proxy-portscan

info:
  name: Open Proxy to Ports on the Proxy's localhost Interface
  author: sullo
  severity: high
  description: The host is configured as a proxy which allows access to its internal interface
  remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports.
  reference:
    - https://blog.projectdiscovery.io/abusing-reverse-proxies-internal-access/
    - https://en.wikipedia.org/wiki/Open_proxy
    - https://www.acunetix.com/vulnerabilities/web/apache-configured-to-run-as-proxy/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
    cvss-score: 8.6
    cwe-id: CWE-441
  metadata:
    max-request: 8
  tags: exposure,config,proxy,misconfig,fuzz,vuln

http:
  - raw:
      - |+
        GET / HTTP/1.1
        Host: {{Hostname}}

      - |+
        GET http://somethingelsethatdoesnotexist/ HTTP/1.1
        Host: somethingelsethatdoesnotexist

      - |+
        GET http://127.0.0.1:21 HTTP/1.1
        Host: 127.0.0.1

      - |+
        GET http://127.0.0.1:22 HTTP/1.1
        Host: 127.0.0.1

      - |+
        GET http://127.0.0.1:25 HTTP/1.1
        Host: 127.0.0.1

      - |+
        GET http://127.0.0.1:110 HTTP/1.1
        Host: 127.0.0.1

      - |+
        GET http://127.0.0.1:587 HTTP/1.1
        Host: 127.0.0.1

      - |+
        GET https://127.0.0.1:587 HTTP/1.1
        Host: 127.0.0.1

    unsafe: true
    matchers:
      - type: dsl
        condition: or
        dsl:
          - (!regex("(?i)FTP",body_1)) && (!regex("(?i)FTP",body_2)) && (regex("(?i)FTP",body_3))
          - (!regex("(?i)SSH-[.]+-+",body_1)) && (!regex("(?i)SSH-[.]+-+",body_2)) && (regex("(?i)SSH-[.]+-+",body_4))
          - (!regex("(?i)POP3",body_1)) && (!regex("(?i)POP3",body_2)) && (regex("(?i)POP3",body_6))
          - (!regex("(?i)SMTP",body_1)) && (!regex("(?i)SMTP",body_2)) && ((regex("(?i)SMTP",body_5)) || (regex("(?i)SMTP",body_7)) || (regex("(?i)SMTP",body_8)))
# digest: 490a0046304402203e9444c3c18bc14ee260af786442eccdb29d4c1231fe797f370c30c324e26ac40220578ac72d9f344788793cf2d9df147417aaa475e179278c28b298e08c0341ca08:922c64590222798bb761d5b6d8e72950

相关漏洞推荐