CVE-2024-28215
📋 TL;DR
nGrinder versions before 3.5.9 have an access control vulnerability that allows attackers to create or modify webhook configurations without proper authorization. This can lead to information disclosure and limited Server-Side Request Forgery (SSRF) attacks. Organizations using vulnerable nGrinder instances are affected.
💻 Affected Systems
- nGrinder
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could configure webhooks to exfiltrate sensitive data from the nGrinder system or perform SSRF attacks against internal services, potentially leading to data breaches or internal network compromise.
Likely Case
Unauthorized users could modify webhook configurations to redirect performance test results or system notifications to attacker-controlled endpoints, leading to information disclosure about test environments and results.
If Mitigated
With proper network segmentation and access controls, the impact would be limited to the nGrinder application itself without access to critical internal systems.
🎯 Exploit Status
Exploitation requires some level of access to the nGrinder interface but bypasses authorization checks for webhook configuration. The vulnerability is straightforward to exploit once an attacker gains initial access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.5.9
Vendor Advisory: https://cve.naver.com/detail/cve-2024-28215.html
Restart Required: Yes
Instructions:
1. Download nGrinder 3.5.9 or later from the official repository. 2. Stop the current nGrinder service. 3. Backup your configuration and data. 4. Install the new version. 5. Restart the nGrinder service. 6. Verify the webhook configuration access controls are functioning properly.
🔧 Temporary Workarounds
Disable Webhook Functionality
allTemporarily disable webhook functionality in nGrinder configuration to prevent exploitation
Edit nGrinder configuration file and set 'webhook.enabled=false' or remove webhook configuration sections
Network Access Restriction
allRestrict network access to nGrinder webhook configuration endpoints
Configure firewall rules to block external access to nGrinder webhook API endpoints (typically /webhook/* paths)
🧯 If You Can't Patch
- Implement strict network segmentation to isolate nGrinder from sensitive internal systems
- Enable detailed logging and monitoring of webhook configuration changes and implement alerting for unauthorized modifications
🔍 How to Verify
Check if Vulnerable:
Check nGrinder version via web interface or configuration files. If version is below 3.5.9, the system is vulnerable.
Check Version:
Check nGrinder web interface dashboard or examine version.txt in installation directory
Verify Fix Applied:
After upgrading to 3.5.9, attempt to access webhook configuration endpoints with unauthorized credentials - access should be denied.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to webhook configuration endpoints
- Unexpected webhook configuration changes
- Webhook calls to unfamiliar external domains
Network Indicators:
- Outbound connections from nGrinder to unexpected external IPs or domains
- Unusual webhook payload patterns
SIEM Query:
source="ngrinder" AND (uri_path="/webhook/*" AND http_status="200" AND user_role!="admin")