This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: SSRF & RFI via exposed proxy. π **Consequences**: Server fetches content from ANY URI. Attackers can bypass firewalls, access internal services, or include remote files. Critical integrity loss.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **CWE-918**: Server-Side Request Forgery (SSRF). π **Flaw**: The plugin exposes a proxy function to **unauthenticated** users. No input validation on the target URI.
π **Privileges**: None needed (Unauthenticated). π **Data**: Can read internal network data, scan ports, access cloud metadata (IMDS), or perform RFI. Full server-side reach.
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: LOW. π« **Auth**: No authentication required. π **Config**: Just needs the vulnerable plugin/theme installed. Easy to trigger via simple HTTP requests.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp**: YES. π **PoC**: Available via Nuclei templates (ProjectDiscovery). π **Wild Exp**: High risk due to simple SSRF nature. Automated scanners can detect this easily.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for OnAir2/KenthaRadio versions. π§ͺ **Test**: Send request to the exposed proxy endpoint with a target URI (e.g., http://127.0.0.1). If it returns content, you are vulnerable.
π§ **No Patch?**: Disable the plugin/theme. π **WAF**: Block requests to the specific proxy endpoint. π§± **Network**: Restrict outbound traffic from the web server to prevent SSRF success.
Q10Is it urgent? (Priority Suggestion)
β‘ **Priority**: HIGH. π **Urgency**: Critical because it requires NO auth. π **Date**: Published Aug 2021. If still running old versions, patch NOW.