github.com/darklynx/request-baskets is vulnerable to Server-side Request Forgery (SSRF). The vulnerability exists due to the improper validation in the /api/baskets/{name}
path, allowing an admin authenticated attacker to access network resources and sensitive information via a maliciously crafted API request.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/darklynx/request-baskets | le | v1.2.1 | |
github.com/darklynx/request-baskets | le | v1.2.1 |
packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html
packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html
request-baskets.com
gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3
github.com/advisories/GHSA-58g2-vgpg-335q
github.com/darklynx/request-baskets
notes.sjtu.edu.cn/s/MUUhEymt7