We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Learn more about funding links in repositories.
Report abuse
There was an error while loading. Please reload this page.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSRF漏洞,即服务端请求伪造漏洞。通过构造file ftp等协议可读取内网文件,探测内网端口,甚至直接控制服务器。参考地址
file ftp
file
没有漏洞tag issue,只好在这提啦
No response
- Version: - Operating System: 系统无关 - Browser (if used): 无关
无关本地日志
The text was updated successfully, but these errors were encountered:
非常感谢反馈,刚刚已经修复。
如果还有发现云端安全隐患,麻烦发送邮件到 845765@qq.com 报告,谢谢。
Sorry, something went wrong.
88250
No branches or pull requests
Uh oh!
There was an error while loading. Please reload this page.
该问题是否已经被报告过了? Is there an existing issue for this?
I have searched the existing issues
描述问题 Describe the problem
漏洞摘要
SSRF漏洞,即服务端请求伪造漏洞。通过构造
file ftp
等协议可读取内网文件,探测内网端口,甚至直接控制服务器。参考地址漏洞证明
file
伪协议读取系统文件
2. 文件读取至本地笔记收集箱(p.s此文件只能读取到用户名,不会泄露思源服务器上密码等敏感信息)漏洞修复
file ftp
等协议。期待的结果 Expected result
没有漏洞tag issue,只好在这提啦
截屏或者录屏演示 Screenshot or screen recording presentation
No response
版本环境 Version environment
日志文件 Log file
无关本地日志
更多信息 More information
No response
The text was updated successfully, but these errors were encountered: