**Description:**
Hi team,
I would like to report a security vulnerability I discovered on your website. I was able to perform Server-Side Request Forgery (SSRF) attacks via the xmlrpc.php file at https://ââââââââ endpoint.
Using a simple POST request to the xmlrpc.php endpoint, I was able to bypass input validation and send a request to an external URL.
I have attached a proof of concept (PoC) script that demonstrates this vulnerability. It sends a request to my VPS server using interact.sh client (https://github.com/projectdiscovery/interactsh), but an attacker could use this technique to send requests to any URL of their choosing.
## References
https://www.sonarsource.com/blog/wordpress-core-unauthenticated-blind-ssrf/
https://nitesculucian.github.io/2019/07/01/exploiting-the-xmlrpc-php-on-all-wordpress-versions/
## Impact
The vulnerability could be used to conduct further attacks, such as accessing internal systems or exfiltrating sensitive data.
## System Host(s)
âââââââ
## Affected Product(s) and Version(s)
## CVE Numbers
## Steps to Reproduce
1. Start a server in vps using interact.sh or use burpsuite collaborator.
2. Go to: https://âââ/xmlrpc.php
3. See the response:
“`
XML-RPC server accepts POST requests only.
“`
4. Go to burpsuite and send this request to the repeater.
5. Change the request method to POST.
6. Get the URL of your server listener and set this payload at request:
“`
pingback.ping
https://your server
https://âââââ/
“`
7. Send the POST request.
8. See the response in your server log.
## Suggested Mitigation/Remediation Actions
I would recommend implementing input validation and filtering to prevent these types of attacks in the future. Please let me know if you require any additional information or if you have any questions.Read More