CVE-2024-41668

8.3 HIGH

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in cBioPortal's proxy endpoint. Unauthenticated attackers can exploit publicly exposed instances, while authenticated users can exploit private instances. The vulnerability allows attackers to make arbitrary HTTP requests from the server, potentially accessing internal resources.

💻 Affected Systems

Products:
  • cBioPortal for Cancer Genomics
Versions: All versions before 6.0.12
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Public instances are vulnerable without authentication. Private instances require authenticated users to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to internal networks by making the server request internal resources like metadata services, databases, or cloud instance metadata.

🟠

Likely Case

Information disclosure from internal services, scanning of internal networks, or accessing cloud metadata to obtain credentials.

🟢

If Mitigated

Limited impact with proper network segmentation and authentication controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities are commonly exploited. The advisory includes technical details that could facilitate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.12

Vendor Advisory: https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm

Restart Required: Yes

Instructions:

1. Backup your current installation. 2. Update to version 6.0.12 using your deployment method (Docker, manual, etc.). 3. Restart the cBioPortal service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable proxy endpoint via nginx

all

Block access to the vulnerable /proxy endpoint using web server configuration

location /proxy { deny all; return 403; }

🧯 If You Can't Patch

  • Implement strict network segmentation to limit the server's access to internal resources
  • Add authentication requirements for all endpoints and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check if version is below 6.0.12 and the /proxy endpoint is accessible without authentication

Check Version:

Check the application interface or deployment configuration for version information

Verify Fix Applied:

Confirm version is 6.0.12 or higher and test that /proxy endpoint returns appropriate error or requires authentication

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /proxy endpoint
  • Outbound requests from server to internal IP ranges
  • Multiple failed authentication attempts followed by proxy requests

Network Indicators:

  • HTTP requests from server to internal services that don't normally communicate
  • Traffic patterns suggesting internal network scanning

SIEM Query:

source_ip=server_ip AND (uri_path="/proxy" OR dest_ip IN internal_ranges)

🔗 References

📤 Share & Export