CVE-2022-24568
📋 TL;DR
CVE-2022-24568 is a Server-Side Request Forgery (SSRF) vulnerability in Novel-plus v3.6.0 that allows attackers to make arbitrary HTTP requests from the vulnerable server. This can lead to internal network reconnaissance, data exfiltration, or attacks against internal services. All users running Novel-plus v3.6.0 are affected.
💻 Affected Systems
- Novel-plus
📦 What is this software?
Novel Plus by Xxyopen
⚠️ Risk & Real-World Impact
Worst Case
Attackers could pivot to internal systems, access cloud metadata services, perform port scanning, or launch attacks against internal infrastructure using the server as a proxy.
Likely Case
Attackers will use the vulnerability to scan internal networks, access internal web applications, or retrieve sensitive data from internal APIs.
If Mitigated
With proper network segmentation and egress filtering, impact is limited to the local server environment and adjacent systems.
🎯 Exploit Status
SSRF vulnerabilities are commonly exploited and weaponized. The GitHub issue shows proof of concept exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v3.6.1 or later
Vendor Advisory: https://github.com/201206030/novel-plus/issues/80
Restart Required: Yes
Instructions:
1. Backup your Novel-plus installation and database. 2. Download the latest version from the official repository. 3. Replace the vulnerable files with patched versions. 4. Restart the Novel-plus application server.
🔧 Temporary Workarounds
Input Validation Filter
allImplement strict input validation to reject URLs pointing to internal IP ranges or localhost
Network Egress Filtering
linuxConfigure firewall rules to restrict outbound HTTP/HTTPS traffic from the Novel-plus server
iptables -A OUTPUT -p tcp --dport 80 -j DROP
iptables -A OUTPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the Novel-plus server from internal networks
- Deploy a web application firewall (WAF) with SSRF protection rules
🔍 How to Verify
Check if Vulnerable:
Check if Novel-plus version is 3.6.0 by examining the application files or configuration
Check Version:
Check the version.txt file or application configuration files
Verify Fix Applied:
Verify the application version is 3.6.1 or later and test SSRF payloads no longer work
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from the Novel-plus server
- Requests to internal IP addresses or localhost
Network Indicators:
- HTTP traffic from Novel-plus server to unexpected internal destinations
- Port scanning activity originating from the server
SIEM Query:
source="novel-plus" AND (dest_ip=10.0.0.0/8 OR dest_ip=172.16.0.0/12 OR dest_ip=192.168.0.0/16 OR dest_ip=127.0.0.1)