Description
TheHive Project UnshortenLink analyzer before 1.1, included in Cortex-Analyzers before 1.15.2, has SSRF. To exploit the vulnerability, an attacker must create a new analysis, select URL for Data Type, and provide an SSRF payload like "http://127.0.0.1:22" in the Data parameter. The result can be seen in the main dashboard. Thus, it is possible to do port scans on localhost and intranet hosts.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Alexandre Basquin · textwebappsmultiple
https://www.exploit-db.com/exploits/46820
References (2)
Core 2
Core References
Release Notes, Vendor Advisory x_refsource_confirm
https://blog.thehive-project.org/2019/02/11/unshortenlink-ssrf-and-cortex-analyzers-1-15-2/
Third Party Advisory x_refsource_misc
http://packetstormsecurity.com/files/152804/TheHive-Project-Cortex-2.1.3-Server-Side-Request-Forgery.html
Scores
CVSS v3
7.7
EPSS
0.0327
EPSS Percentile
87.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Details
CWE
CWE-918
Status
published
Products (1)
thehive-project/cortex-analyzers
< 1.15.2
Published
May 09, 2019
Tracked Since
Feb 18, 2026