CVE-2024-46413

5.1 MEDIUM

📋 TL;DR

CVE-2024-46413 is a Server-Side Request Forgery (SSRF) vulnerability in Rebuild v3.7.7 that allows attackers to make the server send HTTP requests to internal systems via the type parameter in the RBStoreController. This affects all deployments of Rebuild v3.7.7 that expose the vulnerable endpoint.

💻 Affected Systems

Products:
  • Rebuild
Versions: v3.7.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments with the vulnerable endpoint accessible. The com.rebuild.web.admin.rbstore.RBStoreController#loadDataIndex method must be exposed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data from internal networks, or perform port scanning of internal infrastructure.

🟠

Likely Case

Information disclosure from internal services, potential access to metadata services in cloud environments, or limited internal network reconnaissance.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, potentially only revealing error messages or service availability.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of the vulnerable endpoint and parameter manipulation. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after v3.7.7

Vendor Advisory: https://github.com/getrebuild/rebuild

Restart Required: No

Instructions:

1. Upgrade Rebuild to version after v3.7.7. 2. Verify the com.rebuild.web.admin.rbstore.RBStoreController#loadDataIndex method has proper input validation. 3. Test the fix by attempting SSRF against the patched endpoint.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for the type parameter to only allow expected values

Network Segmentation

all

Restrict outbound network access from the Rebuild server to only necessary services

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SSRF patterns in the type parameter
  • Restrict access to the /admin/rbstore endpoint using authentication and IP whitelisting

🔍 How to Verify

Check if Vulnerable:

Test if the /admin/rbstore endpoint accepts arbitrary URLs in the type parameter and makes external requests

Check Version:

Check Rebuild version in application configuration or via admin interface

Verify Fix Applied:

Attempt SSRF against the patched endpoint and verify it rejects malicious type parameter values

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from Rebuild server
  • Requests to internal IP addresses from the application
  • Errors from the RBStoreController with unusual type parameters

Network Indicators:

  • HTTP requests from Rebuild server to unexpected internal services
  • Port scanning activity originating from the Rebuild server

SIEM Query:

source="rebuild-server" AND (dest_ip IN private_ranges OR dest_port_scanning=true)

🔗 References

📤 Share & Export