Umbraco Server-Side Request Forgery (SSRF) Scanner
Detects ‘Server-Side Request Forgery (SSRF)’ vulnerability in Umbraco affecting version 8.14.1.
Short Info
Level
Medium
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 3 days
Scan only one
URL
Toolbox
-
Umbraco is a popular open-source content management system (CMS) widely used by developers and businesses for creating and managing web applications and sites. Its flexibility and robust feature set make it an attractive choice for various industries, including e-commerce, education, and publishing. Umbraco allows seamless integration with third-party tools, making it a dynamic platform for web development and content management. Despite its capabilities, maintaining security in Umbraco systems is crucial to protect sensitive information and ensure the integrity of web applications.
Server-Side Request Forgery (SSRF) is a vulnerability that allows attackers to send crafted requests from a vulnerable server. In this case, the Umbraco CMS is exploited via its `baseUrl` parameter in API calls. By manipulating this parameter, an attacker can coerce the server to access internal or external resources without proper authorization. This makes it possible to bypass access controls or obtain sensitive information indirectly through the server's interaction with other resources.
The vulnerability lies in the improper handling of the `baseUrl` parameter within several endpoints, such as `GetContextHelpForPage` and `GetRemoteDashboardContent`. When an attacker supplies a malicious `baseUrl`, the server processes the request, potentially leaking sensitive information or facilitating further attacks. The parameterized API endpoints expose the server to this exploit, especially when not validated correctly against untrusted input.
Exploitation of this SSRF vulnerability can result in unauthorized access to internal services, disclosure of sensitive information, or even pivoting to further attacks on the infrastructure. Depending on the server configuration, it may also allow interaction with external systems for malicious purposes.
REFERENCES