Description
A vulnerability has been found in orionsec orion-ops up to 5925824997a3109651bbde07460958a7be249ed1. Affected by this issue is some unknown functionality of the file orion-ops-api/orion-ops-web/src/main/java/cn/orionsec/ops/controller/MachineInfoController.java of the component SSH Connection Handler. Such manipulation of the argument host/sshPort/username/password/authType leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. A patch should be applied to remediate this issue. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
Timeline
| 2025-11-30: | Advisory disclosed |
| 2025-11-30: | VulDB entry created |
| 2025-11-30: | VulDB entry last update |
Credits
sh7err04 (VulDB User)
References
github.com/.../blob/main/archives/orion-ops-ssrf-1/report.md
github.com/.../blob/main/archives/orion-ops-ssrf-1/report.md
vuldb.com/?id.333819 (VDB-333819 | orionsec orion-ops SSH Connection MachineInfoController.java server-side request forgery)
vuldb.com/?ctiid.333819 (VDB-333819 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.692069 (Submit #692069 | orionsec (project owner of Orion-ops) Orion-ops (server component) <= master commit 5925824997a3109651bbde07460958a7be249ed1 Server-Side Request Forgery (SSRF))
github.com/.../blob/main/archives/orion-ops-ssrf-1/report.md
github.com/.../blob/main/archives/orion-ops-ssrf-1/report.md