CVE-2023-48910
📋 TL;DR
Microcks up to version 1.17.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the /jobs and /artifact/download components. Attackers can send crafted GET requests to access internal network resources and potentially sensitive information. Organizations running vulnerable Microcks versions are affected.
💻 Affected Systems
- Microcks
📦 What is this software?
Microcks by Microcks
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access internal services, sensitive data, cloud metadata, or pivot to other systems, potentially leading to full network compromise.
Likely Case
Unauthorized access to internal HTTP services, file retrieval from internal systems, or reconnaissance of internal network infrastructure.
If Mitigated
Limited to accessing only allowed internal resources if proper network segmentation and input validation are in place.
🎯 Exploit Status
The vulnerability requires only crafted GET requests to the vulnerable endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.18.0 or later
Vendor Advisory: https://github.com/orgs/microcks/discussions/892
Restart Required: Yes
Instructions:
1. Upgrade Microcks to version 1.18.0 or later. 2. Restart the Microcks service. 3. Verify the fix by testing the vulnerable endpoints.
🔧 Temporary Workarounds
Network Access Control
allRestrict network access to Microcks instances using firewalls or network policies.
Reverse Proxy Filtering
allConfigure reverse proxy to block or sanitize requests to /jobs and /artifact/download endpoints.
🧯 If You Can't Patch
- Isolate Microcks instances in a restricted network segment with no access to sensitive internal resources.
- Implement strict input validation and URL filtering at the application or network level.
🔍 How to Verify
Check if Vulnerable:
Check if Microcks version is 1.17.1 or earlier and if /jobs or /artifact/download endpoints are accessible.
Check Version:
Check the Microcks UI or container image tag for version information.
Verify Fix Applied:
Confirm Microcks version is 1.18.0 or later and test that crafted requests to vulnerable endpoints are rejected.
📡 Detection & Monitoring
Log Indicators:
- Unusual requests to /jobs or /artifact/download endpoints with external or internal IPs
- Multiple failed requests to these endpoints
Network Indicators:
- Outbound connections from Microcks to unexpected internal services
- Unusual traffic patterns from Microcks instance
SIEM Query:
source="microcks" AND (uri_path="/jobs" OR uri_path="/artifact/download") AND (status_code=200 OR status_code=302)