Because of no validation on a curl command in MagpieRSS 0.72 in the /extlib/Snoopy.class.inc file, when you send a request to the /scripts/magpie_debug.php or /scripts/magpie_simple.php page, it's possible to request any internal page if you use a https request.
References
Link | Resource |
---|---|
https://github.com/kellan/magpierss/blob/04d2a88b97fdba5813d01dc0d56c772d97360bb5/extlib/Snoopy.class.inc#L660 | Third Party Advisory |
https://pastebin.com/kpzHKKJu | Exploit Third Party Advisory |
https://github.com/kellan/magpierss/blob/04d2a88b97fdba5813d01dc0d56c772d97360bb5/extlib/Snoopy.class.inc#L660 | Third Party Advisory |
https://pastebin.com/kpzHKKJu | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kellan/magpierss/blob/04d2a88b97fdba5813d01dc0d56c772d97360bb5/extlib/Snoopy.class.inc#L660 - Third Party Advisory | |
References | () https://pastebin.com/kpzHKKJu - Exploit, Third Party Advisory |
Information
Published : 2021-04-02 20:15
Updated : 2024-11-21 06:00
NVD link : CVE-2021-28941
Mitre link : CVE-2021-28941
CVE.ORG link : CVE-2021-28941
JSON object : View
Products Affected
magpierss_project
- magpierss
CWE
CWE-918
Server-Side Request Forgery (SSRF)