CVE-2020-15002
MEDIUMOX App Suite <=7.10.3 - Server-Side Request Forgery via Messaging API
Title source: manualExploitation Summary
EIP tracks 2 public exploits for CVE-2020-15002. PoCs published by skr0x1c0.
AI-analyzed exploit summary This repository contains a Go-based proof-of-concept exploit for CVE-2020-15002, an SSRF vulnerability in Open-Xchange. The exploit leverages a ToCToU race condition in DNS resolution, combined with a large payload to delay processing, to bypass URL validation and execute SSRF attacks.
Description
OX App Suite through 7.10.3 allows SSRF via the the /ajax/messaging/message message API.
Exploits (2)
This repository contains a Go-based proof-of-concept exploit for CVE-2020-15002, an SSRF vulnerability in Open-Xchange. The exploit leverages a ToCToU race condition in DNS resolution, combined with a large payload to delay processing, to bypass URL validation and execute SSRF attacks.
This repository contains a Go-based proof-of-concept for CVE-2020-15002, a blind SSRF vulnerability in Open-Xchange Documents. The exploit leverages improper URL validation after redirects to perform internal port scanning and reconnaissance.
References (2)
Scores
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N