CVE-2021-27670

9.8 CRITICAL

📋 TL;DR

CVE-2021-27670 is a Server-Side Request Forgery (SSRF) vulnerability in Appspace 6.2.4 that allows attackers to make unauthorized requests from the vulnerable server to internal or external systems. This affects all Appspace 6.2.4 deployments with the vulnerable API endpoint exposed. Attackers can exploit this to access internal services, perform port scanning, or potentially access cloud metadata services.

💻 Affected Systems

Products:
  • Appspace
Versions: 6.2.4
Operating Systems: All platforms running Appspace
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the API endpoint /api/v1/core/proxy/jsonprequest which appears to be enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal network services, access to cloud instance metadata leading to credential theft, and potential data exfiltration from internal systems.

🟠

Likely Case

Internal network reconnaissance, access to internal web services, and potential data leakage from internal APIs.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, though some internal service enumeration may still be possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public proof-of-concept scripts exist, and exploitation requires only HTTP requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.2.5 and later

Vendor Advisory: https://www.appspace.com/support/security-advisories/

Restart Required: Yes

Instructions:

1. Backup current Appspace configuration. 2. Download Appspace 6.2.5 or later from vendor portal. 3. Follow Appspace upgrade documentation. 4. Verify the /api/v1/core/proxy/jsonprequest endpoint is no longer vulnerable.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block or restrict access to the vulnerable API endpoint

WAF rule: Block requests to /api/v1/core/proxy/jsonprequest with suspicious URL parameters

Network Segmentation

all

Restrict outbound network access from Appspace servers

Firewall rules to limit Appspace server egress to only required destinations

🧯 If You Can't Patch

  • Implement strict network egress filtering to prevent Appspace servers from accessing internal services
  • Deploy a WAF with SSRF protection rules in front of Appspace

🔍 How to Verify

Check if Vulnerable:

Test if /api/v1/core/proxy/jsonprequest endpoint accepts external URL parameters and makes requests to internal IPs (e.g., http://169.254.169.254 for AWS metadata)

Check Version:

Check Appspace admin interface or configuration files for version number

Verify Fix Applied:

Verify the endpoint no longer processes arbitrary URL parameters or returns error messages for SSRF attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /api/v1/core/proxy/jsonprequest with URL parameters pointing to internal IPs or unusual domains
  • Outbound connections from Appspace server to unexpected internal services

Network Indicators:

  • Appspace server making HTTP requests to internal IP ranges (10.x.x.x, 172.16.x.x, 192.168.x.x) or cloud metadata endpoints

SIEM Query:

source="appspace_logs" AND uri="/api/v1/core/proxy/jsonprequest" AND (url_param CONTAINS "169.254.169.254" OR url_param CONTAINS "10." OR url_param CONTAINS "192.168.")

🔗 References

📤 Share & Export