CVE-2024-50714

7.5 HIGH

📋 TL;DR

This SSRF vulnerability in Smart Agent v1.1.0 allows attackers to make the server send requests to internal systems, potentially exposing sensitive information. Organizations using this specific version of Smart Agent from smarts-srl.com are affected. The vulnerability is exploitable via the /FB/getFbVideoSource.php endpoint.

💻 Affected Systems

Products:
  • smarts-srl.com Smart Agent
Versions: v1.1.0
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific version mentioned; requires the /FB/getFbVideoSource.php component to be accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker accesses internal services, steals credentials, performs lateral movement, or executes remote code via chained vulnerabilities.

🟠

Likely Case

Information disclosure from internal services, metadata exposure, or limited internal network reconnaissance.

🟢

If Mitigated

Limited impact due to network segmentation, proper input validation, or restricted outbound connections.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details available via Packet Storm; SSRF typically requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://smarts-srl.com

Restart Required: No

Instructions:

Check vendor website for updates; if unavailable, apply workarounds or consider alternative software.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

all

Restrict access to /FB/getFbVideoSource.php via web server configuration or firewall rules.

# Apache: RewriteRule ^/FB/getFbVideoSource\.php$ - [F]
# Nginx: location ~ ^/FB/getFbVideoSource\.php$ { deny all; }

Network Segmentation

all

Isolate Smart Agent server from internal networks to limit SSRF impact.

🧯 If You Can't Patch

  • Implement strict input validation and URL whitelisting for the affected component.
  • Deploy a WAF with SSRF protection rules and monitor for suspicious outbound requests.

🔍 How to Verify

Check if Vulnerable:

Test if /FB/getFbVideoSource.php accepts external URLs via parameter manipulation; check version in application interface or configuration files.

Check Version:

Check application admin panel or configuration files for version string '1.1.0'.

Verify Fix Applied:

Confirm endpoint blocks SSRF attempts or returns errors for external URLs; verify updated version if patch released.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /FB/getFbVideoSource.php with URL parameters
  • Outbound connections from server to internal IPs or unexpected domains

Network Indicators:

  • HTTP traffic from server to internal services triggered by external requests
  • DNS queries for internal hostnames from the server

SIEM Query:

source="web_logs" AND uri="/FB/getFbVideoSource.php" AND (param="*http://*" OR param="*https://*")

🔗 References

📤 Share & Export