CVE-2024-28215

7.5 HIGH

📋 TL;DR

nGrinder versions before 3.5.9 have an access control vulnerability that allows attackers to create or modify webhook configurations without proper authorization. This can lead to information disclosure and limited Server-Side Request Forgery (SSRF) attacks. Organizations using vulnerable nGrinder instances are affected.

💻 Affected Systems

Products:
  • nGrinder
Versions: All versions before 3.5.9
Operating Systems: All platforms running nGrinder
Default Config Vulnerable: ⚠️ Yes
Notes: All nGrinder deployments with webhook functionality enabled are vulnerable. The vulnerability exists in the access control mechanism for webhook configuration endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could configure webhooks to exfiltrate sensitive data from the nGrinder system or perform SSRF attacks against internal services, potentially leading to data breaches or internal network compromise.

🟠

Likely Case

Unauthorized users could modify webhook configurations to redirect performance test results or system notifications to attacker-controlled endpoints, leading to information disclosure about test environments and results.

🟢

If Mitigated

With proper network segmentation and access controls, the impact would be limited to the nGrinder application itself without access to critical internal systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the nGrinder interface but bypasses authorization checks for webhook configuration. The vulnerability is straightforward to exploit once an attacker gains initial access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.9

Vendor Advisory: https://cve.naver.com/detail/cve-2024-28215.html

Restart Required: Yes

Instructions:

1. Download nGrinder 3.5.9 or later from the official repository. 2. Stop the current nGrinder service. 3. Backup your configuration and data. 4. Install the new version. 5. Restart the nGrinder service. 6. Verify the webhook configuration access controls are functioning properly.

🔧 Temporary Workarounds

Disable Webhook Functionality

all

Temporarily disable webhook functionality in nGrinder configuration to prevent exploitation

Edit nGrinder configuration file and set 'webhook.enabled=false' or remove webhook configuration sections

Network Access Restriction

all

Restrict network access to nGrinder webhook configuration endpoints

Configure firewall rules to block external access to nGrinder webhook API endpoints (typically /webhook/* paths)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate nGrinder from sensitive internal systems
  • Enable detailed logging and monitoring of webhook configuration changes and implement alerting for unauthorized modifications

🔍 How to Verify

Check if Vulnerable:

Check nGrinder version via web interface or configuration files. If version is below 3.5.9, the system is vulnerable.

Check Version:

Check nGrinder web interface dashboard or examine version.txt in installation directory

Verify Fix Applied:

After upgrading to 3.5.9, attempt to access webhook configuration endpoints with unauthorized credentials - access should be denied.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to webhook configuration endpoints
  • Unexpected webhook configuration changes
  • Webhook calls to unfamiliar external domains

Network Indicators:

  • Outbound connections from nGrinder to unexpected external IPs or domains
  • Unusual webhook payload patterns

SIEM Query:

source="ngrinder" AND (uri_path="/webhook/*" AND http_status="200" AND user_role!="admin")

🔗 References

📤 Share & Export