Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Squidex has Server-Side Request Forgery (SSRF) Issue in Webhook Configuration
Vulnerability Description
Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define "Webhooks" as actions within the Rules engine. The url parameter in the webhook configuration does not appear to validate or restrict destination IP addresses. It accepts local addresses such as 127.0.0.1 or localhost. When a rule is triggered (Either manual trigger by manually calling the trigger endpoint or by a content update or any other triggers), the backend server executes an HTTP request to the user-supplied URL. Crucially, the server logs the full HTTP response in the rule execution log (lastDump field), which is accessible via the API. Which turns a "Blind" SSRF into a "Full Read" SSRF. As of time of publication, no patched versions are available.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Vulnerability Type
服务端请求伪造(SSRF)
Vulnerability Title
Squidex 代码问题漏洞
Vulnerability Description
Squidex是Squidex开源的一个内容管理系统。 Squidex 7.21.0及之前版本存在代码问题漏洞,该漏洞源于Webhook配置中的URL参数未验证或限制目标IP地址,可能导致完全读取的服务端请求伪造。
CVSS Information
N/A
Vulnerability Type
N/A