CVE-2024-24759

9.3 CRITICAL

📋 TL;DR

This CVE describes a server-side request forgery (SSRF) vulnerability in MindsDB that allows attackers to bypass SSRF protection using DNS rebinding techniques. Attackers can potentially access internal services, perform denial of service attacks, or interact with internal systems. All MindsDB instances prior to version 23.12.4.2 are affected.

💻 Affected Systems

Products:
  • MindsDB
Versions: All versions prior to 23.12.4.2
Operating Systems: All platforms running MindsDB
Default Config Vulnerable: ⚠️ Yes
Notes: Any MindsDB instance with SSRF functionality enabled is vulnerable. The vulnerability affects the core SSRF protection mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal network services, data exfiltration, and persistent access to internal systems through SSRF combined with DNS rebinding.

🟠

Likely Case

Denial of service attacks and unauthorized access to internal services accessible from the MindsDB server.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, though SSRF bypass could still enable some internal service interaction.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

DNS rebinding attacks require control of a malicious domain but are well-documented techniques. The advisory suggests exploitation is feasible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.12.4.2

Vendor Advisory: https://github.com/mindsdb/mindsdb/security/advisories/GHSA-4jcv-vp96-94xr

Restart Required: Yes

Instructions:

1. Backup your MindsDB configuration and data. 2. Update MindsDB to version 23.12.4.2 or later using your package manager or installation method. 3. Restart the MindsDB service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation and Egress Filtering

all

Restrict outbound network access from MindsDB servers to only necessary services and implement proper network segmentation.

DNS Filtering and Validation

all

Implement DNS filtering to block malicious domains and validate all external DNS responses.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MindsDB instances from critical internal services
  • Deploy web application firewalls (WAF) with SSRF protection rules and monitor for suspicious outbound requests

🔍 How to Verify

Check if Vulnerable:

Check MindsDB version. If version is earlier than 23.12.4.2, the system is vulnerable.

Check Version:

mindsdb --version

Verify Fix Applied:

Confirm MindsDB version is 23.12.4.2 or later and test SSRF functionality with controlled DNS rebinding scenarios.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from MindsDB to internal IP addresses
  • Multiple DNS queries for the same domain with different IP resolutions
  • Failed SSRF protection mechanism logs

Network Indicators:

  • DNS queries followed by HTTP requests to resolved IPs that differ from original domain
  • Outbound requests from MindsDB to unexpected internal services

SIEM Query:

source="mindsdb" AND (http_request OR dns_query) | stats count by dest_ip, query

🔗 References

📤 Share & Export