![]() ![]() ![]() ![]() which addresses/ports are accessible, the titles and meta descriptions of HTML pages and denial of service amplification. This may lead to leak the server IP address, which could be hidden behind a CDN retrieving information in the internal network, e.g. The attacker can send malicious requests to a RSSHub server, to make the server send HTTP GET requests to arbitrary destinations and see partial responses. Prior to version 1.0.0-master.a429472, RSSHub allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network or conduct Denial-of-Service (DoS) attacks. RSSHub is an open source RSS feed generator. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |