You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm not sure if it really matters, but currently it looks like only the open redirect payload is included:
{
"payload": "<allowed>[@<attacker>",
"description": "Spring Framework CVE-2024-22243 <allowed>[@<attacker>",
"filters": [],
"tags": ["URL", "HOST"],
"id": "1da2f627d702248b9e61cc23912d2c729e52f878"
},
This would probably fail on most SSRF-vulnerable implementations unless the user tries to swap the positions of <allowed> and <attacker>. For completeness and one-shot list generation, it might be worth adding the other version of the payload too (<attacker>[@<allowed>).
The text was updated successfully, but these errors were encountered:
Original message by @SeanPesce
The text was updated successfully, but these errors were encountered: