Description
BrightSign Digital Signage Diagnostic Web Server 8.2.26 and less contains an unauthenticated server-side request forgery vulnerability in the 'url' GET parameter of the Download Speed Test service. Attackers can specify external domains to bypass firewalls and perform network enumeration by forcing the application to make arbitrary HTTP requests to internal network hosts.
Problem types
CWE-918: Server-Side Request Forgery (SSRF)
Product status
Any version
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5595.php
www.exploit-db.com/exploits/48843
www.exploit-db.com/exploits/48843 (ExploitDB-48843)
www.brightsign.biz (BrightSign Homepage)
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5595.php (Zero Science Lab Disclosure)
github.com/zeroscience (Zero Science GitHub Repository)
www.vulncheck.com/...gnostic-web-server-unauthenticated-ssrf (VulnCheck Advisory: BrightSign Digital Signage Diagnostic Web Server 8.2.26 Unauthenticated SSRF)