nomisec
WORKING POC
30 stars
by entr0pie · remote
https://github.com/entr0pie/CVE-2023-27163
This repository contains a functional Proof-of-Concept (PoC) for CVE-2023-27163, an SSRF vulnerability in Request-Baskets <= 1.2.1. The script automates the creation of a malicious basket that forwards requests to an attacker-controlled server, demonstrating the SSRF exploit.
Classification
Working Poc 100%
Target:
Request-Baskets <= 1.2.1
No auth needed
Prerequisites:
Access to the Request-Baskets API endpoint · Attacker-controlled server to receive forwarded requests
nomisec
WORKING POC
5 stars
by samh4cks · infoleak
https://github.com/samh4cks/CVE-2023-27163-InternalProber
This repository contains a functional exploit PoC for CVE-2023-27163, which leverages a misconfiguration in the Request-Baskets application to perform internal port scanning. The script automates the creation of baskets and reconfigures them to probe internal ports, effectively demonstrating the SSRF vulnerability.
Classification
Working Poc 95%
Target:
Request-Baskets (versions affected by CVE-2023-27163)
No auth needed
Prerequisites:
Access to a vulnerable Request-Baskets instance · Network connectivity to the target
nomisec
WORKING POC
4 stars
by seanrdev · infoleak
https://github.com/seanrdev/cve-2023-27163
This repository contains a functional Python script that exploits CVE-2023-27163, an SSRF vulnerability in request-baskets. The script automates the enumeration of internal servers by creating baskets and forwarding requests to internal targets.
Classification
Working Poc 95%
Target:
request-baskets
No auth needed
Prerequisites:
Access to the target request-baskets API · A wordlist for enumeration
nomisec
WORKING POC
2 stars
by MasterCode112 · infoleak
https://github.com/MasterCode112/CVE-2023-27163
This repository contains a functional PoC for CVE-2023-27163, an SSRF vulnerability in Request-Baskets <= 1.2.1. The script automates the creation of a malicious basket that forwards requests to an attacker-controlled server, demonstrating the SSRF exploit.
Classification
Working Poc 95%
Target:
Request-Baskets <= 1.2.1
No auth needed
Prerequisites:
Access to the Request-Baskets API endpoint · Attacker-controlled server or IP to receive forwarded requests
nomisec
WORKING POC
2 stars
by apaz-dev · poc
https://github.com/apaz-dev/CVE-2023-27163
This repository contains a functional exploit script for CVE-2023-27163, an SSRF vulnerability in Request-Baskets (<= 1.2.1). The script automates the creation of a malicious basket that forwards requests to an attacker-controlled URL, enabling SSRF attacks.
Classification
Working Poc 95%
Target:
Request-Baskets <= 1.2.1
No auth needed
Prerequisites:
Access to the target Request-Baskets server · Attacker-controlled server to forward requests
nomisec
WORKING POC
2 stars
by thomas-osgood · infoleak
https://github.com/thomas-osgood/CVE-2023-27163
This repository contains a functional Go-based exploit for CVE-2023-27163, targeting Mailtrail's basket API to achieve remote code execution (RCE) via crafted HTTP requests and command injection.
Classification
Working Poc 95%
Target:
Mailtrail (version not explicitly specified, but likely v0.53 based on referenced Python exploit)
No auth needed
Prerequisites:
Network access to the target Mailtrail instance · Mailtrail API endpoint exposed
nomisec
WORKING POC
2 stars
by rvizx · infoleak
https://github.com/rvizx/CVE-2023-27163
This repository contains a functional exploit for CVE-2023-27163, an SSRF vulnerability in Request Baskets versions <1.2.1. The exploit creates a malicious basket that forwards requests to an attacker-controlled URL via the `/api/baskets/{name}` endpoint.
Classification
Working Poc 95%
Target:
Request Baskets <1.2.1
No auth needed
Prerequisites:
Target running vulnerable Request Baskets instance · Network access to the target
nomisec
WORKING POC
2 stars
by HusenjanDev · client-side
https://github.com/HusenjanDev/CVE-2023-27163-AND-Mailtrail-v0.53
This repository contains a functional exploit that chains CVE-2023-27163 (SSRF in Requests Baskets v1.2.1) with a command injection vulnerability in Mailtrail v0.53 to achieve remote code execution via a reverse shell.
Classification
Working Poc 95%
Target:
Requests Baskets v1.2.1 and Mailtrail v0.53
No auth needed
Prerequisites:
Target running Requests Baskets v1.2.1 and Mailtrail v0.53 · Network access to the target · Listener setup for reverse shell
nomisec
WORKING POC
1 stars
by theopaid · poc
https://github.com/theopaid/CVE-2023-27163-Request-Baskets-Local-Ports-Bruteforcer
This repository contains a functional Python exploit for CVE-2023-27163, an SSRF vulnerability in Request-Baskets. The script automates the creation of a basket, sets a forward_url to local ports, and brute-forces internal services by checking responses for open ports.
Classification
Working Poc 95%
Target:
Request-Baskets (versions affected by CVE-2023-27163)
No auth needed
Prerequisites:
Python 3.x · requests library · target URL · list of ports to scan
nomisec
WORKING POC
1 stars
by J0ey17 · infoleak
https://github.com/J0ey17/Exploit_CVE-2023-27163
This repository contains a functional Python script that exploits CVE-2023-27163, an SSRF vulnerability in Request Basket. The script automates the creation of a basket, retrieval of an API token, and configuration of the basket to forward requests to internal ports on the vulnerable server.
Classification
Working Poc 95%
Target:
Request Basket
No auth needed
Prerequisites:
Access to a vulnerable Request Basket instance · Network connectivity to the target server
nomisec
WORKING POC
1 stars
by KharimMchatta · infoleak
https://github.com/KharimMchatta/basketcraft
This repository contains a functional bash script that exploits CVE-2023-27163, an SSRF vulnerability in Request-Baskets up to version 1.2.1. The script automates the creation of a malicious basket that forwards requests to an attacker-controlled server, demonstrating the vulnerability.
Classification
Working Poc 95%
Target:
Request-Baskets <= 1.2.1
No auth needed
Prerequisites:
Target running Request-Baskets <= 1.2.1 · Attacker-controlled server to receive forwarded requests
nomisec
WORKING POC
1 stars
by davuXVI · client-side
https://github.com/davuXVI/CVE-2023-27163
This repository contains a functional exploit script for CVE-2023-27163, an SSRF vulnerability in request-baskets up to v1.2.1. The script automates the creation of a malicious basket, triggers an SSRF to fetch a reverse shell payload, and executes it via command injection in the login endpoint.
Classification
Working Poc 95%
Target:
request-baskets up to v1.2.1
No auth needed
Prerequisites:
Access to the target's request-baskets instance · Network connectivity to the attacker's machine
nomisec
WORKING POC
1 stars
by ThickCoco · client-side
https://github.com/ThickCoco/CVE-2023-27163-POC
This repository contains a functional exploit PoC for CVE-2023-27163, an SSRF vulnerability in Request-Baskets (<= 1.2.1). The script automates the creation of baskets to forward requests to a target URL, enabling server-side request forgery attacks.
Classification
Working Poc 95%
Target:
Request-Baskets <= 1.2.1
No auth needed
Prerequisites:
Access to a vulnerable Request-Baskets instance · A target URL to forward requests to · A wordlist for fuzzing
nomisec
WORKING POC
by tombstoneghost · remote
https://github.com/tombstoneghost/htb-sau-exploit-chain
This repository contains a functional Python exploit that chains CVE-2023-27163 (SSRF in Request Baskets) with an unauthenticated RCE in Maltrail 0.53 to deliver a reverse shell. The exploit automates the process of creating a request basket, leveraging it to interact with Maltrail, and executing a reverse shell payload.
Classification
Working Poc 95%
Target:
Request Baskets ≤ 1.2.1 and Maltrail 0.53
No auth needed
Prerequisites:
Target URL with vulnerable Request Baskets and Maltrail instances · Attacker-controlled listener for reverse shell
nomisec
WORKING POC
by thealchimist86 · poc
https://github.com/thealchimist86/CVE-2023-27163---Maltrail-0.53---RCE
This repository contains a functional exploit for CVE-2023-27163, targeting Maltrail 0.53. The exploit leverages command injection in the login endpoint to achieve remote code execution (RCE) via a reverse shell payload.
Classification
Working Poc 95%
Target:
Maltrail 0.53
No auth needed
Prerequisites:
Network access to the target · Python 3 environment
nomisec
WORKING POC
by thealchimist86 · infoleak
https://github.com/thealchimist86/CVE-2023-27163---SSRF-Baskets-Requests
This repository contains a functional Python script that exploits CVE-2023-27163, an SSRF vulnerability in Baskets. The script sends a crafted POST request to create a basket that forwards requests to an internal URL, demonstrating the SSRF.
Classification
Working Poc 95%
Target:
Baskets (version not specified)
No auth needed
Prerequisites:
Target URL with Baskets API endpoint · Internal URL to forward requests to
nomisec
WORKING POC
by lukehebe · poc
https://github.com/lukehebe/CVE-2023-27163-POC
This repository contains a functional exploit for CVE-2023-27163, an SSRF vulnerability in Request-Baskets up to v1.2.1. The exploit creates a basket to forward requests to an internal service and chains it with an RCE payload to establish a reverse shell.
Classification
Working Poc 95%
Target:
Request-Baskets <= 1.2.1
No auth needed
Prerequisites:
Access to a local server to host the payload · Network access to the target
nomisec
WORKING POC
by G4sp4rCS · remote
https://github.com/G4sp4rCS/htb-sau-automated
This exploit targets CVE-2023-27163 by leveraging an SSRF vulnerability in the MailTrail application to trigger a reverse shell. It first creates a malicious basket via the API, then executes a base64-encoded Python reverse shell payload through command injection.
Classification
Working Poc 95%
Target:
MailTrail (unknown version)
No auth needed
Prerequisites:
Network access to target · Listener setup for reverse shell
github
WORKING POC
by dugisan3rd · pythonpoc
https://github.com/dugisan3rd/exploit/tree/main/'request-baskets'-SSRF (CVE-2023-27163)
The repository contains a functional Python exploit for CVE-2023-27163, an SSRF vulnerability in 'request-baskets' <= v1.2.1. The exploit demonstrates the ability to create baskets, trigger SSRF requests, and scan ports via crafted API calls.
Classification
Working Poc 95%
Target:
request-baskets <= v1.2.1
No auth needed
Prerequisites:
network access to the target · Python 3 with requests and pwntools libraries
nomisec
WORKING POC
by Rishabh-Kumar-Cyber-Sec · remote-auth
https://github.com/Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning
This script exploits CVE-2023-27163, an SSRF vulnerability in the target software, by sending crafted requests to scan internal ports. It iterates through ports 1-65535, attempting to forward requests to localhost via the vulnerable API endpoint.
Classification
Working Poc 90%
Target:
Unknown (likely a web application with basket API functionality)
Auth required
Prerequisites:
Valid authorization token · Access to vulnerable API endpoint
nomisec
WORKING POC
by madhavmehndiratta · infoleak
https://github.com/madhavmehndiratta/CVE-2023-27163
This repository contains a functional Python script that exploits CVE-2023-27163, an SSRF vulnerability in request-baskets up to v1.2.1. The script creates a proxy basket that forwards requests to an attacker-controlled server, demonstrating the vulnerability.
Classification
Working Poc 95%
Target:
request-baskets v1.2.1 and below
No auth needed
Prerequisites:
Access to the target request-baskets instance · Attacker-controlled server to receive forwarded requests
nomisec
WORKING POC
by Hamibubu · infoleak
https://github.com/Hamibubu/CVE-2023-27163
This repository contains a functional Python exploit for CVE-2023-27163, which targets an SSRF vulnerability in the Basket API. The script sends a crafted POST request to create a malicious basket that forwards requests to an attacker-controlled URL.
Classification
Working Poc 95%
Target:
Basket API (versions affected by CVE-2023-27163)
No auth needed
Prerequisites:
Network access to the target Basket API · Attacker-controlled URL to forward requests to
nomisec
WORKING POC
by cowsecurity · poc
https://github.com/cowsecurity/CVE-2023-27163
This repository contains a functional Python exploit for CVE-2023-27163, an SSRF vulnerability in Request-Baskets v1.2.1. The exploit creates a proxy basket that forwards requests to an attacker-controlled server, demonstrating the SSRF flaw.
Classification
Working Poc 95%
Target:
Request-Baskets v1.2.1
No auth needed
Prerequisites:
Network access to the target Request-Baskets instance · Attacker-controlled server to receive forwarded requests
nomisec
WORKING POC
by overgrowncarrot1 · infoleak
https://github.com/overgrowncarrot1/CVE-2023-27163
This repository contains a functional exploit for CVE-2023-27163, an SSRF vulnerability in the Baskets API. The script sends a crafted JSON payload to the target URL, triggering an SSRF to an internal service (127.0.0.1:80).
Classification
Working Poc 95%
Target:
Baskets API (unknown version)
No auth needed
Prerequisites:
Target URL with vulnerable Baskets API endpoint
vulncheck_xdb
WORKING POC
infoleak
https://github.com/theopaid/CVE-2023-27163-Request-Baskets
This repository contains a functional Python exploit for CVE-2023-27163, an SSRF vulnerability in Request-Baskets. The script creates a basket, sets a forward_url to local ports, and checks for open services by analyzing responses.
Classification
Working Poc 95%
Target:
Request-Baskets
No auth needed
Prerequisites:
target URL · basket name · list of ports to scan
vulncheck_xdb
WORKING POC
infoleak
https://github.com/lukehebe/CVE-2023-27163
This repository contains a functional exploit for CVE-2023-27163, an SSRF vulnerability in Request-Baskets up to v1.2.1. The exploit creates a basket to forward requests to an internal service and chains it with an RCE payload to achieve remote code execution via a reverse shell.
Classification
Working Poc 95%
Target:
Request-Baskets <= 1.2.1
No auth needed
Prerequisites:
access to a local server to host the payload · network access to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/Rubioo02/CVE-2023-27163
This repository contains a functional exploit for CVE-2023-27163, an SSRF vulnerability in Request-Baskets (<= 1.2.1). The exploit creates a malicious basket that forwards requests to an attacker-controlled URL, enabling SSRF attacks.
Classification
Working Poc 95%
Target:
Request-Baskets <= 1.2.1
No auth needed
Prerequisites:
access to the Request-Baskets API endpoint · attacker-controlled server to forward requests
vulncheck_xdb
WORKING POC
infoleak
https://github.com/mathias-mrsn/CVE-2023-27163
The repository contains a functional Python exploit for CVE-2023-27163, an SSRF vulnerability in Request-Baskets up to version 1.2.1. The exploit creates a basket with a malicious forward_url to proxy requests to an internal service.
Classification
Working Poc 95%
Target:
Request-Baskets v1.2.1
No auth needed
Prerequisites:
publicly accessible Request-Baskets instance · knowledge of internal service URL
vulncheck_xdb
WORKING POC
remote
https://github.com/josephberger/CVE-2023-27163
This repository contains a functional exploit for CVE-2023-27163, targeting Maltrail v0.53. The exploit leverages command injection in the login endpoint by embedding a base64-encoded reverse shell payload in the 'username' parameter.
Classification
Working Poc 95%
Target:
Maltrail v0.53
No auth needed
Prerequisites:
Network access to the target · Python 3 environment · Listener setup for reverse shell