Lucene search

K
huntr0x2374619851A4-2A08-4196-80E9-AB41953491D8
HistoryMay 14, 2022 - 12:37 p.m.

Local file inclusion

2022-05-1412:37:41
0x2374
www.huntr.dev
23
server files fetching
ssrf
metadata extraction

EPSS

0.001

Percentile

51.0%

Description

https://app.diagrams.net/embed2.js?&fetch= is used to fetch data and i tried to perform ssrf by extracting google cloud metadata but was unable to do but i am still able to fetch server files like /etc/passwd.

Proof of Concept

1. Visit https://app.diagrams.net/embed2.js?&fetch=
2. Enter file:///etc/passwd in fetch parameter and see the content of /etc/passwd is fetched in url encoded format.
3. Decode the url data and you can see the contents of /etc/passwd where the server is hosted.

EPSS

0.001

Percentile

51.0%

Related for 619851A4-2A08-4196-80E9-AB41953491D8