CVE-2024-22217

6.5 MEDIUM

📋 TL;DR

This Server-Side Request Forgery (SSRF) vulnerability in Terminalfour allows authenticated users to abuse specific features to make requests to internal services, potentially accessing sensitive information on the server. It affects all Terminalfour installations before version 8.3.19 where authenticated users have access to vulnerable features.

💻 Affected Systems

Products:
  • Terminalfour
Versions: All versions before 8.3.19
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to vulnerable features. The specific vulnerable features are not detailed in public advisories.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, sensitive server data, cloud metadata, or pivot to other internal systems, potentially leading to full server compromise.

🟠

Likely Case

Authenticated users accessing internal services to steal sensitive data or perform reconnaissance on internal network segments.

🟢

If Mitigated

Limited to authenticated users only accessing non-critical internal services if network segmentation is properly implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of vulnerable features. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.3.19

Vendor Advisory: https://docs.terminalfour.com/release-notes/security-notices/cve-2024-22217/

Restart Required: Yes

Instructions:

1. Backup your Terminalfour installation and database. 2. Download Terminalfour version 8.3.19 or later from official sources. 3. Follow Terminalfour upgrade procedures as documented. 4. Restart the Terminalfour service. 5. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network access from Terminalfour server to only necessary services

Access Control

all

Review and restrict user permissions to limit access to vulnerable features

🧯 If You Can't Patch

  • Implement strict network egress filtering to block unauthorized outbound requests from Terminalfour server
  • Apply principle of least privilege to user accounts and monitor for suspicious SSRF patterns

🔍 How to Verify

Check if Vulnerable:

Check Terminalfour version via admin interface or configuration files. If version is below 8.3.19, system is vulnerable.

Check Version:

Check Terminalfour admin dashboard or consult installation documentation for version verification method

Verify Fix Applied:

Confirm Terminalfour version is 8.3.19 or higher via admin interface or version check command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from Terminalfour server
  • Requests to internal IP addresses or localhost from application
  • Access patterns to vulnerable features by authenticated users

Network Indicators:

  • Outbound HTTP requests from Terminalfour server to internal network segments
  • Requests to cloud metadata services (169.254.169.254, etc.)

SIEM Query:

source="terminalfour" AND (dest_ip=10.0.0.0/8 OR dest_ip=172.16.0.0/12 OR dest_ip=192.168.0.0/16 OR dest_ip=127.0.0.0/8 OR dest_ip=169.254.169.254)

🔗 References

📤 Share & Export