PartKeepr v1.4.0 url attachment 'add parts' - SSRF
|Name||PartKeepr v1.4.0 url attachment 'add parts' - SSRF|
|Kind||Server Side Request Forgery|
|Rule||100. Server-side request forgery (SSRF)|
|CVSSv3 Base Score||4.3|
In PartKeepr versions up to and including 1.4.0, the functionality to upload attachments using a URL when creating a part does not validate that requests can be made to local ports, allowing an authenticated user to carry out SSRF attacks and port enumeration.
Proof of Concept
- Go to 'Add Part'.
- Click on 'Attachments'.
- Click on 'Add'.
- Fill the 'URL' field with an url using a local port "http://127.0.0.1:3306".
- Click on 'Upload'.
- Click on the uploaded file in order to download the file and see the content.
There is no exploit for the vulnerability but can be manually exploited.
By 2022-01-04 there is not a patch resolving the issue.
The vulnerability was discovered by Oscar
Uribe from the Offensive
Vendor page https://partkeepr.org/