New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Typecho v1.2.1 SSRF vulnerability #1647
Comments
Pingback模块的设计之初就是为了向其他博客网站确认你的文章是否被引用,而你提到这里有SSRF漏洞的问题在之前的版本出现过且已经处理了。 |
Hello, this vulnerability may not exist as an SSRF vulnerability. Based on your description, there may be attackers using the Pingback module to cause DoS or DDoS attacks on other sites. This's the relevant literature. Its level of harm has constituted a security vulnerability,I'm not planning to apply for a CVE number for this vulnerability, but I hope you can fix it as soon as possible. Thanks for your reply. |
I'm still looking for a simple and reliable way to prevent the pingback interface from being used for DDOS amplification attacks. |
Vulnerability report
Description
Attackers can pass malicious URLs as parameters to the pingback.ping method by constructing malicious requests. The first parameter in this method allows passing any URL, and the server will send the request with that URL as a parameter. Due to the lack of effective input verification and filtering mechanisms, attackers can exploit this vulnerability to initiate server-side requests, which may lead to security issues such as sensitive information leakage and server resource abuse.
Proof of Concept
问题出现的环境
The text was updated successfully, but these errors were encountered: