CVE-2024-50811

9.1 CRITICAL

📋 TL;DR

This SSRF vulnerability in Hopetree iZone LTS allows attackers to make the server send unauthorized requests to internal systems. It affects systems running the vulnerable version of iZone with the active push function enabled. Attackers can potentially access internal services that should not be exposed.

💻 Affected Systems

Products:
  • Hopetree iZone LTS
Versions: Up to commit c011b48
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires active push function to be enabled/accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal network services, data exfiltration, or lateral movement to other systems via server-initiated requests to internal resources.

🟠

Likely Case

Information disclosure from internal services, port scanning of internal networks, or limited internal service interaction.

🟢

If Mitigated

No impact if proper input validation and network segmentation prevent unauthorized requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the vulnerable endpoint; GitHub issue shows technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: After commit c011b48

Vendor Advisory: https://github.com/Hopetree/izone/issues/290

Restart Required: Yes

Instructions:

1. Update to latest iZone version after commit c011b48. 2. Apply input validation fixes in bd_push.py. 3. Restart the iZone service.

🔧 Temporary Workarounds

Disable Active Push Function

all

Temporarily disable the vulnerable active push feature if not needed.

Modify configuration to disable push_urls() and get_urls() functions

Network Segmentation

all

Restrict outbound network access from the iZone server to only necessary services.

Configure firewall rules to block unauthorized outbound requests from iZone server

🧯 If You Can't Patch

  • Implement strict input validation for push_urls() and get_urls() functions
  • Deploy WAF rules to block SSRF patterns in requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check if iZone version is at or before commit c011b48 and review bd_push.py for missing input validation.

Check Version:

git log --oneline | head -1

Verify Fix Applied:

Verify updated version after c011b48 and test that push_urls() properly validates URLs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from iZone server to internal IPs
  • Requests to push_urls() with suspicious URL parameters

Network Indicators:

  • Outbound connections from iZone server to unexpected internal services
  • HTTP requests to localhost or internal IP ranges

SIEM Query:

source="iZone" AND (url="*push_urls*" OR url="*get_urls*") AND (dst_ip="127.*" OR dst_ip="10.*" OR dst_ip="172.16.*" OR dst_ip="192.168.*")

🔗 References

📤 Share & Export