Vulnerabilities > CVE-2019-7652 - Server-Side Request Forgery (SSRF) vulnerability in Thehive-Project Cortex-Analyzers
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
TheHive Project UnshortenLink analyzer before 1.1, included in Cortex-Analyzers before 1.15.2, has SSRF. To exploit the vulnerability, an attacker must create a new analysis, select URL for Data Type, and provide an SSRF payload like "http://127.0.0.1:22" in the Data parameter. The result can be seen in the main dashboard. Thus, it is possible to do port scans on localhost and intranet hosts.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Exploit-Db
id | EDB-ID:46820 |
last seen | 2019-05-10 |
modified | 2019-05-10 |
published | 2019-05-10 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/46820 |
title | TheHive Project Cortex < 1.15.2 - Server-Side Request Forgery |
Packetstorm
data source | https://packetstormsecurity.com/files/download/152804/thehivepc-ssrf.txt |
id | PACKETSTORM:152804 |
last seen | 2019-05-11 |
published | 2019-05-10 |
reporter | Alexandre Basquin |
source | https://packetstormsecurity.com/files/152804/TheHive-Project-Cortex-2.1.3-Server-Side-Request-Forgery.html |
title | TheHive Project Cortex 2.1.3 Server Side Request Forgery |
References
- http://packetstormsecurity.com/files/152804/TheHive-Project-Cortex-2.1.3-Server-Side-Request-Forgery.html
- https://blog.thehive-project.org/2019/02/11/unshortenlink-ssrf-and-cortex-analyzers-1-15-2/
- http://packetstormsecurity.com/files/152804/TheHive-Project-Cortex-2.1.3-Server-Side-Request-Forgery.html
- https://blog.thehive-project.org/2019/02/11/unshortenlink-ssrf-and-cortex-analyzers-1-15-2/