- Status Closed
-
Assigned To
cbay - Private
Opened by waloodi_109 - 11.11.2024
Last edited by cbay - 12.11.2024
FS#95 - SSRF WITH FILE UPLOAD FUNCTIONALITY
SSRF WITH FILE UPLOAD FUNCTIONALITY:
Hello Team, I hope you are doing well. I found a ssrf through pdf upload in https://admin.alwaysdata.com/support.
Steps to Reproduce:
1. Go to https://admin.alwaysdata.com/support and upload a pdf file which have ssrf through ( "Burp Collab" or malicious url redirection "attacker.com")
2. Send this file to any user when he/she open that file and click the link in that it will redirect to attacker website or http and dns response will be shown in Burpsuite.
Impact
The vulnerability could be used to conduct further attacks, such as accessing internal systems or exfiltrating sensitive data.
Attacker will redirect any user to their website to steal data of user and can do whatever he/she wants.
Thank You,
Waleed Anwar
Loading...
Available keyboard shortcuts
- Alt + ⇧ Shift + l Login Dialog / Logout
- Alt + ⇧ Shift + a Add new task
- Alt + ⇧ Shift + m My searches
- Alt + ⇧ Shift + t focus taskid search
Tasklist
- o open selected task
- j move cursor down
- k move cursor up
Task Details
- n Next task
- p Previous task
- Alt + ⇧ Shift + e ↵ Enter Edit this task
- Alt + ⇧ Shift + w watch task
- Alt + ⇧ Shift + y Close Task
Task Editing
- Alt + ⇧ Shift + s save task
Hello,
If I understand correctly, your scenario has nothing to do with SSRF (which implies that the server does unwanted requests).
Basically, what you're saying is, if you upload a PDF which has a "bad" link in it from the support section and you make the user (from our support team) click on it, then the user will go to that (bad) link?
You don't need to upload a PDF for that, and I'm afraid we cannot consider this a vulnerability.
Kind regards,
Cyril
Attacker can send this file to anyuser to redirect it to the malicious website, the link is added through hyperlink. The Burp Collaborater showing http and dns responses, attacker can take the ip for further port scanning and so on.