SSRF Bypass in WWBN AVideo
The isSSRFSafeURL() function in WWBN AVideo can be bypassed using IPv4-mapped IPv6 addresses, allowing unauthenticated access to internal networks, cloud metadata services, and localhost. This vulnerability affects WWBN AVideo versions <= 26.0 and can be exploited by sending a crafted request to the plugin/LiveLinks/proxy.php endpoint.
This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.
A security flaw has been found in the WWBN AVideo platform, which is an open-source video platform. This flaw allows attackers to bypass security checks and access internal networks, cloud services, and even the localhost.
This can be done by using a special type of IP address that tricks the system into thinking it's a safe and allowed connection. This means that an attacker could potentially access sensitive information or take control of the system.
The good news is that a fix is available, and users can update their WWBN AVideo platform to the latest version to patch this vulnerability.
Affected Products
Remediation
The fix is available in commit 75ce8a579a58c9d4c7aafe453fbced002cb8f373. Users can update their WWBN AVideo platform to the latest version to patch this vulnerability.