CVE-2024-36675

9.1 CRITICAL

📋 TL;DR

LyLme_spage v1.9.5 contains a Server-Side Request Forgery (SSRF) vulnerability in the get_head function that allows attackers to make arbitrary HTTP requests from the vulnerable server. This can lead to internal network scanning, service enumeration, and potential data exfiltration. Any system running LyLme_spage v1.9.5 with the vulnerable function exposed is affected.

💻 Affected Systems

Products:
  • LyLme_spage
Versions: v1.9.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the get_head function which appears to be part of the core functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot to internal systems, access cloud metadata services, perform port scanning of internal networks, and potentially achieve remote code execution through chained attacks.

🟠

Likely Case

Internal network reconnaissance, access to internal HTTP services, and potential data leakage from internal APIs or services.

🟢

If Mitigated

Limited to external resource consumption and potential denial of service if proper network segmentation and egress filtering are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are commonly exploited and tooling exists for automated exploitation. The GitHub issue shows proof of concept details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://github.com/LyLme/lylme_spage/issues/92

Restart Required: No

Instructions:

1. Monitor the GitHub repository for patches. 2. Consider disabling or removing the vulnerable function if possible. 3. Implement network-level controls as workarounds.

🔧 Temporary Workarounds

Network Egress Filtering

linux

Restrict outbound HTTP/HTTPS traffic from the application server to only necessary external services

iptables -A OUTPUT -p tcp --dport 80 -j DROP
iptables -A OUTPUT -p tcp --dport 443 -j DROP

Application Firewall Rules

all

Implement WAF rules to block SSRF patterns in requests

# WAF configuration depends on specific solution (ModSecurity, Cloudflare, etc.)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable server from internal resources
  • Deploy a reverse proxy with request validation to filter malicious SSRF attempts

🔍 How to Verify

Check if Vulnerable:

Test if the get_head function accepts arbitrary URLs by attempting to make requests to internal services or external domains you control

Check Version:

Check the application version in the admin panel or configuration files

Verify Fix Applied:

Verify that URL validation is implemented and the function rejects requests to internal IP ranges and restricted domains

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the application server
  • Requests to internal IP addresses from the application
  • Multiple failed connection attempts to various ports

Network Indicators:

  • HTTP traffic from application server to unexpected internal services
  • Port scanning patterns originating from the application server

SIEM Query:

source="application_logs" AND (url CONTAINS "127.0.0.1" OR url CONTAINS "localhost" OR url CONTAINS "169.254.169.254" OR url CONTAINS "10." OR url CONTAINS "192.168." OR url CONTAINS "172.16.")

🔗 References

📤 Share & Export