iBLISSLabs / Server-Side-Request-Forgery-SSRF-on-EXMAGE---WordPress-Image-Links

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Blind Server Side Request Forgery (SSRF) in EXMAGE - WordPress Image Links

This PoC describe how to exploit SSRF on EXMAGE - WordPress Image Links version 1.0.3

CVE ID

CVE-2022-1037 | EXMAGE <= 1.0.4 - Admin+ Blind SSRF

Description

The EXMAGE plugin - WordPress Image Links version 1.0.3 does not have protections against SSRF, so it is possible to forge requests to internal services and enumerate web servers that are not directly exposed, if you know the path of an image

1

Attack Scenario

Let's say there is a web service that is running locally

3

After trying to directly access the service, we are not successful

4

Then, we can perform an enumeration of this service through the SSRF present in the EXMAGE plugin - WordPress Image Links

5

6

7

with this, we were able to enumerate web servers by forging requests.

About