CVE-2024-50714
📋 TL;DR
This SSRF vulnerability in Smart Agent v1.1.0 allows attackers to make the server send requests to internal systems, potentially exposing sensitive information. Organizations using this specific version of Smart Agent from smarts-srl.com are affected. The vulnerability is exploitable via the /FB/getFbVideoSource.php endpoint.
💻 Affected Systems
- smarts-srl.com Smart Agent
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attacker accesses internal services, steals credentials, performs lateral movement, or executes remote code via chained vulnerabilities.
Likely Case
Information disclosure from internal services, metadata exposure, or limited internal network reconnaissance.
If Mitigated
Limited impact due to network segmentation, proper input validation, or restricted outbound connections.
🎯 Exploit Status
Exploit details available via Packet Storm; SSRF typically requires minimal technical skill to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://smarts-srl.com
Restart Required: No
Instructions:
Check vendor website for updates; if unavailable, apply workarounds or consider alternative software.
🔧 Temporary Workarounds
Block Vulnerable Endpoint
allRestrict access to /FB/getFbVideoSource.php via web server configuration or firewall rules.
# Apache: RewriteRule ^/FB/getFbVideoSource\.php$ - [F]
# Nginx: location ~ ^/FB/getFbVideoSource\.php$ { deny all; }
Network Segmentation
allIsolate Smart Agent server from internal networks to limit SSRF impact.
🧯 If You Can't Patch
- Implement strict input validation and URL whitelisting for the affected component.
- Deploy a WAF with SSRF protection rules and monitor for suspicious outbound requests.
🔍 How to Verify
Check if Vulnerable:
Test if /FB/getFbVideoSource.php accepts external URLs via parameter manipulation; check version in application interface or configuration files.
Check Version:
Check application admin panel or configuration files for version string '1.1.0'.
Verify Fix Applied:
Confirm endpoint blocks SSRF attempts or returns errors for external URLs; verify updated version if patch released.
📡 Detection & Monitoring
Log Indicators:
- Unusual requests to /FB/getFbVideoSource.php with URL parameters
- Outbound connections from server to internal IPs or unexpected domains
Network Indicators:
- HTTP traffic from server to internal services triggered by external requests
- DNS queries for internal hostnames from the server
SIEM Query:
source="web_logs" AND uri="/FB/getFbVideoSource.php" AND (param="*http://*" OR param="*https://*")