You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Brief description of the issue:
A Server-Side Request Forgery (SSRF) vulnerability has been identified in Gophish that allows attackers to send crafted requests from the vulnerable server. This issue is particularly critical as it does not require prior authentication, enabling the attacker to gain unauthorized access to internal resources and potentially leak sensitive information.
Please provide as many steps as you can to reproduce the problem:
Step 1 - Send any request (GET, POST, etc.) with the hostname and protocol added to the request URI.
What version of Gophish are you using?:
0.12.0
Brief description of the issue:
A Server-Side Request Forgery (SSRF) vulnerability has been identified in Gophish that allows attackers to send crafted requests from the vulnerable server. This issue is particularly critical as it does not require prior authentication, enabling the attacker to gain unauthorized access to internal resources and potentially leak sensitive information.
Please provide as many steps as you can to reproduce the problem:
Impact:
The text was updated successfully, but these errors were encountered: