CVE-2024-41264

7.5 HIGH

📋 TL;DR

This vulnerability in Casdoor v1.636.0 allows attackers to bypass SSH host key verification, potentially enabling man-in-the-middle attacks and credential theft. Any system using the vulnerable SSH client configuration in Casdoor is affected, particularly those connecting to external SSH servers.

💻 Affected Systems

Products:
  • Casdoor
Versions: v1.636.0 and possibly earlier versions using the same SSH client implementation
Operating Systems: All platforms running Casdoor
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where Casdoor's SSH client functionality is used to connect to external servers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept SSH connections, steal credentials, inject malicious code, and gain unauthorized access to downstream systems.

🟠

Likely Case

Credential theft and unauthorized access to SSH servers that Casdoor connects to, potentially compromising linked systems.

🟢

If Mitigated

Limited to connection failures or warnings if proper certificate validation is enforced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept SSH connections between Casdoor and target servers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.637.0 or later

Vendor Advisory: https://github.com/casdoor/casdoor

Restart Required: Yes

Instructions:

1. Update Casdoor to v1.637.0 or later. 2. Restart the Casdoor service. 3. Verify SSH connections use proper host key verification.

🔧 Temporary Workarounds

Disable SSH client functionality

all

Temporarily disable Casdoor's SSH client features if not required.

Modify Casdoor configuration to disable SSH client functionality

Implement network segmentation

all

Restrict Casdoor SSH connections to trusted networks only.

Configure firewall rules to limit Casdoor SSH traffic to specific trusted hosts

🧯 If You Can't Patch

  • Implement strict network controls to prevent man-in-the-middle attacks on SSH connections
  • Monitor all SSH connections from Casdoor for unusual activity or interception attempts

🔍 How to Verify

Check if Vulnerable:

Check if Casdoor version is v1.636.0 or earlier and uses ssh.InsecureIgnoreHostKey() in SSH client code.

Check Version:

Check Casdoor version in admin interface or via API endpoint /api/get-version

Verify Fix Applied:

Verify Casdoor version is v1.637.0 or later and SSH connections now validate host keys properly.

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH host key verification attempts
  • SSH connections to unexpected hosts
  • Multiple SSH connection failures

Network Indicators:

  • Unencrypted SSH traffic interception
  • SSH connections to known malicious IPs

SIEM Query:

source="casdoor" AND (event="ssh_connection" OR event="ssh_error")

🔗 References

📤 Share & Export