You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
eLabFTW is an open source electronic lab notebook for research labs.
This vulnerability allows an attacker to make GET requests on behalf of the server. It is "blind" because the attacker cannot see the result of the request.
3. In the description body place payload: <img src=[your ext. resource] />
4. Save experiment description
5. Launch 'Edit' one more time and save it again
6. Run 'Create PDF' and observe your resource (eg. burp collabolator). You will see that it gets multiple HTTP requests from eLabFTW internal infrastructure.