CVE-2024-47222

9.8 CRITICAL

📋 TL;DR

This vulnerability in Cloud MyOffice SDK Collaborative Editing Server allows Server-Side Request Forgery (SSRF) through manipulation of MS-WOPI protocol requests from external document storage. Attackers can force the server to make unauthorized requests to internal systems, potentially accessing sensitive data or services. Organizations using MyOffice SDK Collaborative Editing Server versions 2.2.2 through 2.8 are affected.

💻 Affected Systems

Products:
  • Cloud MyOffice SDK Collaborative Editing Server
Versions: 2.2.2 through 2.8
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects installations using external document storage with MS-WOPI protocol integration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal network via SSRF to access cloud metadata services, internal APIs, or administrative interfaces, potentially leading to data exfiltration, lateral movement, or full system takeover.

🟠

Likely Case

Unauthorized access to internal services and data via SSRF, potentially exposing sensitive information, internal APIs, or cloud metadata that could be leveraged for further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, restricting the server's ability to reach sensitive internal resources even if SSRF is successful.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSRF vulnerabilities typically have low exploitation complexity, especially when unauthenticated. The MS-WOPI protocol manipulation aspect may require specific knowledge but is well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://support.myoffice.ru/products/myoffice-sdk/

Restart Required: No

Instructions:

1. Monitor vendor advisory for patch release. 2. Upgrade to fixed version when available. 3. Apply patch following vendor instructions.

🔧 Temporary Workarounds

Network Segmentation and Egress Filtering

all

Restrict outbound network access from the Collaborative Editing Server to only necessary external services.

Input Validation for MS-WOPI Requests

all

Implement strict validation and allowlisting for MS-WOPI protocol requests, particularly for external document storage URLs.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable server from sensitive internal systems
  • Deploy web application firewall (WAF) rules to detect and block SSRF patterns in MS-WOPI requests

🔍 How to Verify

Check if Vulnerable:

Check server version via administrative interface or configuration files. If version is between 2.2.2 and 2.8 inclusive, system is vulnerable.

Check Version:

Check application configuration or administrative console for version information

Verify Fix Applied:

Verify version has been upgraded beyond 2.8 or vendor-provided patch has been applied. Test SSRF attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound requests from server to internal IP ranges
  • MS-WOPI protocol requests with unusual URL patterns or internal addresses
  • Failed authentication attempts to internal services from server IP

Network Indicators:

  • Server making unexpected HTTP/HTTPS requests to internal network segments
  • Traffic patterns suggesting SSRF attempts to cloud metadata services

SIEM Query:

source_ip="[server_ip]" AND (dest_ip="169.254.169.254" OR dest_ip="10.*" OR dest_ip="172.16.*" OR dest_ip="192.168.*") AND http_method IN ("GET", "POST")

🔗 References

📤 Share & Export