Guest User

CVE-2022-38580

a guest
Sep 19th, 2022
5,222
0
Never
1
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.53 KB | None | 0 0
  1. CVE-2022-38580
  2. Description: Zalando Skipper is vulnerable to Universal SSRF [Server-Side Request Forgery]
  3. Vulnerable version(s): <= v0.13.236
  4. GitHub: https://github.com/zalando/skipper
  5. Patch: https://github.com/zalando/skipper/releases/tag/v0.13.237
  6. Vulnerable Code: https://github.com/zalando/skipper/pull/2058/commits/36bd409ea926de60f3822b6ea5c07bcfd4d8d9cb
  7. Discoverer: Milad Fadavvi, Hossein Vita
  8. CVSS v3.1 Vector: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
  9. Impact Escalation of Privileges: True
  10. Impact Information Disclosure: True
  11.  
Advertisement
Comments
  • Darledorn
    7 days
    # CSS 0.86 KB | 0 0
    1. ✅ Leaked Exploit Documentation:
    2.  
    3. https://docs.google.com/document/d/1S1iTruSLkgEPO8QtTuo2twS4f2FoJ3_l0-p4GKqeAUY/edit?usp=sharing
    4.  
    5. This made me $13,000 in 2 days.
    6.  
    7. Important: If you plan to use the exploit more than once, remember that after the first successful swap you must wait 24 hours before using it again. Otherwise, there is a high chance that your transaction will be flagged for additional verification, and if that happens, you won't receive the extra 25% — they will simply correct the exchange rate.
    8. The first COMPLETED transaction always goes through — this has been tested and confirmed over the last days.
    9.  
    10. Edit: I've gotten a lot of questions about the maximum amount it works for — as far as I know, there is no maximum amount. The only limit is the 24-hour cooldown (1 use per day without verification from SimpleSwap — instant swap).
Add Comment
Please, Sign In to add comment