The vulnerability is located in the event subscription function, and the corresponding code file is src/scene_server/event_server/service/subscription.go.

Deserialize the request body into a ParamSubscriptionTestCallback object through JSON, and then construct a POST request based on the callbackurl and callbackBody parameters, so the URL and the content of the POST request are fully controllable.

Untitled

Access local port 8090 through SSRF vulnerability.

Untitled