CVE-2024-24759
📋 TL;DR
This CVE describes a server-side request forgery (SSRF) vulnerability in MindsDB that allows attackers to bypass SSRF protection using DNS rebinding techniques. Attackers can potentially access internal services, perform denial of service attacks, or interact with internal systems. All MindsDB instances prior to version 23.12.4.2 are affected.
💻 Affected Systems
- MindsDB
📦 What is this software?
Mindsdb by Mindsdb
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of internal network services, data exfiltration, and persistent access to internal systems through SSRF combined with DNS rebinding.
Likely Case
Denial of service attacks and unauthorized access to internal services accessible from the MindsDB server.
If Mitigated
Limited impact with proper network segmentation and egress filtering, though SSRF bypass could still enable some internal service interaction.
🎯 Exploit Status
DNS rebinding attacks require control of a malicious domain but are well-documented techniques. The advisory suggests exploitation is feasible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 23.12.4.2
Vendor Advisory: https://github.com/mindsdb/mindsdb/security/advisories/GHSA-4jcv-vp96-94xr
Restart Required: Yes
Instructions:
1. Backup your MindsDB configuration and data. 2. Update MindsDB to version 23.12.4.2 or later using your package manager or installation method. 3. Restart the MindsDB service. 4. Verify the update was successful.
🔧 Temporary Workarounds
Network Segmentation and Egress Filtering
allRestrict outbound network access from MindsDB servers to only necessary services and implement proper network segmentation.
DNS Filtering and Validation
allImplement DNS filtering to block malicious domains and validate all external DNS responses.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate MindsDB instances from critical internal services
- Deploy web application firewalls (WAF) with SSRF protection rules and monitor for suspicious outbound requests
🔍 How to Verify
Check if Vulnerable:
Check MindsDB version. If version is earlier than 23.12.4.2, the system is vulnerable.
Check Version:
mindsdb --version
Verify Fix Applied:
Confirm MindsDB version is 23.12.4.2 or later and test SSRF functionality with controlled DNS rebinding scenarios.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from MindsDB to internal IP addresses
- Multiple DNS queries for the same domain with different IP resolutions
- Failed SSRF protection mechanism logs
Network Indicators:
- DNS queries followed by HTTP requests to resolved IPs that differ from original domain
- Outbound requests from MindsDB to unexpected internal services
SIEM Query:
source="mindsdb" AND (http_request OR dns_query) | stats count by dest_ip, query