Description
OpenBMCS 2.4 contains an unauthenticated SSRF vulnerability that allows attackers to bypass firewalls and initiate service and network enumeration on the internal network through the affected application, allowing hijacking of current sessions. Attackers can specify an external domain in the 'ip' parameter to force the application to make an HTTP request to an arbitrary destination host.
Problem types
CWE-918: Server-Side Request Forgery (SSRF)
Product status
2.4
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.exploit-db.com/exploits/50670 (ExploitDB-50670)
www.openbmcs.com (Official Product Homepage)
www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5694.php (Zero Science Lab Disclosure (ZSL-2022-5694))
www.vulncheck.com/...de-request-forgery-ssrf-via-phpqueryphp (VulnCheck Advisory: OpenBMCS Server Side Request Forgery (SSRF) via /php/query.php)