Submit #386432: ltcms.com ltcms V1.0.20 SSRFinfo

Titleltcms.com ltcms V1.0.20 SSRF
DescriptionIn ltcms, there is an API endpoint "api/test/download" that can be used to perform a blind SSRF attack. The corresponding page for this endpoint is located at "app/api/controller/Test.php". This page does not require authentication, allowing anyone to call curl_exec() to request a URL specified in the url parameter. Additionally, due to the lack of protocol filtering, protocols like file, dict, etc., can be used to initiate requests to the internal network.
Source⚠️ https://github.com/DeepMountains/Mirage/blob/main/CVE14-1.md
User
 Dee.Mirage (UID 71702)
Submission08/06/2024 06:10 (3 months ago)
Moderation08/13/2024 16:13 (7 days later)
StatusAccepted
VulDB Entry274360
Points20

Do you need the next level of professionalism?

Upgrade your account now!