Open Hebing123 opened 10 months ago
According to the description of the relevant personnel, the pingbackPing function in /var/widgett/xmlrpc.php file has carried out security checks on the destination host using the Common::checkSafeHost() method, restricting access to the Intranet and reserving the address. Other protocols except HTTP and HTTPS are restricted.
Therefore, this vulnerability may not exist as an SSRF vulnerability.
However, an attacker may use the Pingback module to carry out DoS or DDoS attacks on other sites. It is so dangerous that it constitutes a security vulnerability, I did not apply for a CVE number for this vulnerability, but it could still evolve into a DOS vulnerability. This is worth noting.
Research data demonstrating possible harm: https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/5759/wordpress-xmlrpc-pingback-ddos-vulnerability.
Description
Attackers can pass malicious URLs as parameters to the pingback.ping method by constructing malicious requests. The first parameter in this method allows passing any URL, and the server will send the request with that URL as a parameter. Due to the lack of effective input verification and filtering mechanisms, attackers can exploit this vulnerability to initiate server-side requests, which may lead to security issues such as sensitive information leakage and server resource abuse.
Proof of Concept
问题出现的环境