CVE-2024-48234

4.9 MEDIUM

📋 TL;DR

This SSRF vulnerability in mipjz 5.0.5 allows attackers to make the server send HTTP requests to internal systems by manipulating the postAddress parameter. It affects any system running the vulnerable version of mipjz, potentially exposing internal network resources and sensitive files.

💻 Affected Systems

Products:
  • mipjz
Versions: 5.0.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation when the affected API endpoint is accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker reads sensitive server files, accesses internal services, or performs port scanning of internal networks leading to data exfiltration or lateral movement.

🟠

Likely Case

Unauthorized reading of server files containing configuration data, credentials, or sensitive information from the local filesystem.

🟢

If Mitigated

Limited impact with proper network segmentation and input validation, restricting access to only non-sensitive internal resources.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the admin API endpoint. The GitHub issue demonstrates the vulnerability with example payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/sansanyun/mipjz/issues/18

Restart Required: No

Instructions:

1. Check GitHub repository for official patch. 2. Apply input validation to sanitize postAddress parameter. 3. Implement URL whitelisting for curl requests. 4. Update to patched version when available.

🔧 Temporary Workarounds

Input Validation Filter

all

Add validation to restrict postAddress parameter to allowed URLs only

Modify app\tag\controller\ApiAdminTag.php to validate postAddress against whitelist

Network Restriction

linux

Block outbound HTTP requests from the application server to internal networks

iptables -A OUTPUT -p tcp --dport 80 -d 10.0.0.0/8 -j DROP
iptables -A OUTPUT -p tcp --dport 80 -d 172.16.0.0/12 -j DROP
iptables -A OUTPUT -p tcp --dport 80 -d 192.168.0.0/16 -j DROP

🧯 If You Can't Patch

  • Restrict access to the vulnerable API endpoint using authentication or IP whitelisting
  • Implement web application firewall rules to block SSRF patterns in postAddress parameter

🔍 How to Verify

Check if Vulnerable:

Test if the API endpoint accepts arbitrary URLs in postAddress parameter and makes external requests

Check Version:

Check mipjz version in configuration files or via admin interface

Verify Fix Applied:

Verify that postAddress parameter is properly validated and only allows whitelisted URLs

📡 Detection & Monitoring

Log Indicators:

  • Unusual curl requests to internal IP addresses
  • Multiple failed HTTP requests from application server

Network Indicators:

  • HTTP requests from application server to internal services on unusual ports
  • Outbound requests to file:// or localhost URLs

SIEM Query:

source="application.log" AND "curl_exec" AND ("file://" OR "localhost" OR "127.0.0.1" OR "192.168." OR "10." OR "172.16.")

🔗 References

📤 Share & Export